Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-46713 (GCVE-0-2024-46713)
Vulnerability from cvelistv5
Published
2024-09-13 14:49
Modified
2025-05-04 09:32
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
perf/aux: Fix AUX buffer serialization
Ole reported that event->mmap_mutex is strictly insufficient to
serialize the AUX buffer, add a per RB mutex to fully serialize it.
Note that in the lock order comment the perf_event::mmap_mutex order
was already wrong, that is, it nesting under mmap_lock is not new with
this patch.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Linux | Linux |
Version: 45bfb2e50471abbbfd83d40d28c986078b0d24ff Version: 45bfb2e50471abbbfd83d40d28c986078b0d24ff Version: 45bfb2e50471abbbfd83d40d28c986078b0d24ff Version: 45bfb2e50471abbbfd83d40d28c986078b0d24ff Version: 45bfb2e50471abbbfd83d40d28c986078b0d24ff Version: 45bfb2e50471abbbfd83d40d28c986078b0d24ff |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-46713", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-29T14:58:57.910208Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-29T14:59:13.207Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "kernel/events/core.c", "kernel/events/internal.h", "kernel/events/ring_buffer.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "7882923f1cb88dc1a17f2bf0c81b1fc80d44db82", "status": "affected", "version": "45bfb2e50471abbbfd83d40d28c986078b0d24ff", "versionType": "git" }, { "lessThan": "52d13d224fdf1299c8b642807fa1ea14d693f5ff", "status": "affected", "version": "45bfb2e50471abbbfd83d40d28c986078b0d24ff", "versionType": "git" }, { "lessThan": "9dc7ad2b67772cfb94ceb3b0c9c4023c2463215d", "status": "affected", "version": "45bfb2e50471abbbfd83d40d28c986078b0d24ff", "versionType": "git" }, { "lessThan": "c4b69bee3f4ef76809288fe6827bc14d4ae788ef", "status": "affected", "version": "45bfb2e50471abbbfd83d40d28c986078b0d24ff", "versionType": "git" }, { "lessThan": "b9b6882e243b653d379abbeaa64a500182aba370", "status": "affected", "version": "45bfb2e50471abbbfd83d40d28c986078b0d24ff", "versionType": "git" }, { "lessThan": "2ab9d830262c132ab5db2f571003d80850d56b2a", "status": "affected", "version": "45bfb2e50471abbbfd83d40d28c986078b0d24ff", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "kernel/events/core.c", "kernel/events/internal.h", "kernel/events/ring_buffer.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.1" }, { "lessThan": "4.1", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.226", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.167", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.110", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.51", "versionType": "semver" }, { "lessThanOrEqual": "6.10.*", "status": "unaffected", "version": "6.10.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.11", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.10.226", "versionStartIncluding": "4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.167", "versionStartIncluding": "4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.110", "versionStartIncluding": "4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.6.51", "versionStartIncluding": "4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.10.10", "versionStartIncluding": "4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.11", "versionStartIncluding": "4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/aux: Fix AUX buffer serialization\n\nOle reported that event-\u003emmap_mutex is strictly insufficient to\nserialize the AUX buffer, add a per RB mutex to fully serialize it.\n\nNote that in the lock order comment the perf_event::mmap_mutex order\nwas already wrong, that is, it nesting under mmap_lock is not new with\nthis patch." } ], "providerMetadata": { "dateUpdated": "2025-05-04T09:32:31.367Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/7882923f1cb88dc1a17f2bf0c81b1fc80d44db82" }, { "url": "https://git.kernel.org/stable/c/52d13d224fdf1299c8b642807fa1ea14d693f5ff" }, { "url": "https://git.kernel.org/stable/c/9dc7ad2b67772cfb94ceb3b0c9c4023c2463215d" }, { "url": "https://git.kernel.org/stable/c/c4b69bee3f4ef76809288fe6827bc14d4ae788ef" }, { "url": "https://git.kernel.org/stable/c/b9b6882e243b653d379abbeaa64a500182aba370" }, { "url": "https://git.kernel.org/stable/c/2ab9d830262c132ab5db2f571003d80850d56b2a" } ], "title": "perf/aux: Fix AUX buffer serialization", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-46713", "datePublished": "2024-09-13T14:49:13.691Z", "dateReserved": "2024-09-11T15:12:18.254Z", "dateUpdated": "2025-05-04T09:32:31.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-46713\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-09-13T15:15:15.010\",\"lastModified\":\"2024-09-13T16:37:22.997\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nperf/aux: Fix AUX buffer serialization\\n\\nOle reported that event-\u003emmap_mutex is strictly insufficient to\\nserialize the AUX buffer, add a per RB mutex to fully serialize it.\\n\\nNote that in the lock order comment the perf_event::mmap_mutex order\\nwas already wrong, that is, it nesting under mmap_lock is not new with\\nthis patch.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: perf/aux: Se corrige la serializaci\u00f3n del b\u00fafer AUX. Ole inform\u00f3 que event-\u0026gt;mmap_mutex es estrictamente insuficiente para serializar el b\u00fafer AUX, agregue un mutex por RB para serializarlo por completo. Tenga en cuenta que en el comentario de orden de bloqueo, el orden perf_event::mmap_mutex ya estaba mal, es decir, su anidaci\u00f3n bajo mmap_lock no es nueva con este parche.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2ab9d830262c132ab5db2f571003d80850d56b2a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/52d13d224fdf1299c8b642807fa1ea14d693f5ff\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7882923f1cb88dc1a17f2bf0c81b1fc80d44db82\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9dc7ad2b67772cfb94ceb3b0c9c4023c2463215d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b9b6882e243b653d379abbeaa64a500182aba370\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c4b69bee3f4ef76809288fe6827bc14d4ae788ef\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-46713\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-29T14:58:57.910208Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-29T14:59:02.441Z\"}}], \"cna\": {\"title\": \"perf/aux: Fix AUX buffer serialization\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"45bfb2e50471\", \"lessThan\": \"7882923f1cb8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45bfb2e50471\", \"lessThan\": \"52d13d224fdf\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45bfb2e50471\", \"lessThan\": \"9dc7ad2b6777\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45bfb2e50471\", \"lessThan\": \"c4b69bee3f4e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45bfb2e50471\", \"lessThan\": \"b9b6882e243b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45bfb2e50471\", \"lessThan\": \"2ab9d830262c\", \"versionType\": \"git\"}], \"programFiles\": [\"kernel/events/core.c\", \"kernel/events/internal.h\", \"kernel/events/ring_buffer.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.1\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.1\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.10.226\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.167\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.110\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.51\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.10\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"kernel/events/core.c\", \"kernel/events/internal.h\", \"kernel/events/ring_buffer.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/7882923f1cb88dc1a17f2bf0c81b1fc80d44db82\"}, {\"url\": \"https://git.kernel.org/stable/c/52d13d224fdf1299c8b642807fa1ea14d693f5ff\"}, {\"url\": \"https://git.kernel.org/stable/c/9dc7ad2b67772cfb94ceb3b0c9c4023c2463215d\"}, {\"url\": \"https://git.kernel.org/stable/c/c4b69bee3f4ef76809288fe6827bc14d4ae788ef\"}, {\"url\": \"https://git.kernel.org/stable/c/b9b6882e243b653d379abbeaa64a500182aba370\"}, {\"url\": \"https://git.kernel.org/stable/c/2ab9d830262c132ab5db2f571003d80850d56b2a\"}], \"x_generator\": {\"engine\": \"bippy-9e1c9544281a\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nperf/aux: Fix AUX buffer serialization\\n\\nOle reported that event-\u003emmap_mutex is strictly insufficient to\\nserialize the AUX buffer, add a per RB mutex to fully serialize it.\\n\\nNote that in the lock order comment the perf_event::mmap_mutex order\\nwas already wrong, that is, it nesting under mmap_lock is not new with\\nthis patch.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-11-05T09:45:10.303Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-46713\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-05T09:45:10.303Z\", \"dateReserved\": \"2024-09-11T15:12:18.254Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-09-13T14:49:13.691Z\", \"assignerShortName\": \"Linux\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
wid-sec-w-2024-2148
Vulnerability from csaf_certbund
Published
2024-09-15 22:00
Modified
2025-01-12 23:00
Summary
Linux Kernel: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann eine Schwachstelle in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2148 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2148.json" }, { "category": "self", "summary": "WID-SEC-2024-2148 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2148" }, { "category": "external", "summary": "Linux CVE Announce vom 2024-09-15", "url": "http://lore.kernel.org/linux-cve-announce/2024091316-CVE-2024-46713-5e49@gregkh/" }, { "category": "external", "summary": "Red Hat Customer Portal", "url": "https://access.redhat.com/security/cve/cve-2024-46713#cve-cvss-v3" }, { "category": "external", "summary": "Red Hat Bugzilla \u2013 Bug 2312221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312221" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-070 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-070.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5782 vom 2024-10-03", "url": "https://lists.debian.org/debian-security-announce/2024/msg00195.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-055 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-055.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3912 vom 2024-10-07", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12815.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7154-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7155-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7154-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:0059 vom 2025-01-08", "url": "https://access.redhat.com/errata/RHSA-2025:0059" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7196-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-0059 vom 2025-01-11", "url": "https://linux.oracle.com/errata/ELSA-2025-0059.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2025-01-12T23:00:00.000+00:00", "generator": { "date": "2025-01-13T09:09:11.461+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-2148", "initial_release_date": "2024-09-15T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon und Debian aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-07T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "12" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c5.10.226", "product": { "name": "Open Source Linux Kernel \u003c5.10.226", "product_id": "T037622" } }, { "category": "product_version", "name": "5.10.226", "product": { "name": "Open Source Linux Kernel 5.10.226", "product_id": "T037622-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.10.226" } } }, { "category": "product_version_range", "name": "\u003c5.15.167", "product": { "name": "Open Source Linux Kernel \u003c5.15.167", "product_id": "T037623" } }, { "category": "product_version", "name": "5.15.167", "product": { "name": "Open Source Linux Kernel 5.15.167", "product_id": "T037623-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.15.167" } } }, { "category": "product_version_range", "name": "\u003c6.1.110", "product": { "name": "Open Source Linux Kernel \u003c6.1.110", "product_id": "T037624" } }, { "category": "product_version", "name": "6.1.110", "product": { "name": "Open Source Linux Kernel 6.1.110", "product_id": "T037624-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.1.110" } } }, { "category": "product_version_range", "name": "\u003c6.6.51", "product": { "name": "Open Source Linux Kernel \u003c6.6.51", "product_id": "T037625" } }, { "category": "product_version", "name": "6.6.51", "product": { "name": "Open Source Linux Kernel 6.6.51", "product_id": "T037625-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.6.51" } } }, { "category": "product_version_range", "name": "\u003c6.10.10", "product": { "name": "Open Source Linux Kernel \u003c6.10.10", "product_id": "T037626" } }, { "category": "product_version", "name": "6.10.10", "product": { "name": "Open Source Linux Kernel 6.10.10", "product_id": "T037626-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.10.10" } } }, { "category": "product_version_range", "name": "\u003c6.11-rc7", "product": { "name": "Open Source Linux Kernel \u003c6.11-rc7", "product_id": "T037627" } }, { "category": "product_version", "name": "6.11-rc7", "product": { "name": "Open Source Linux Kernel 6.11-rc7", "product_id": "T037627-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.11-rc7" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-46713", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle im Linux-Kernel. Dieser Fehler existiert wegen des event-\u003emmap_mutex ist absolut unzureichend, um den AUX-Puffer zu serialisieren. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "2951", "T037624", "67646", "T037625", "T000126", "T037626", "T037627", "398363", "T037622", "T037623", "T004914" ] }, "release_date": "2024-09-15T22:00:00.000+00:00", "title": "CVE-2024-46713" } ] }
WID-SEC-W-2024-2148
Vulnerability from csaf_certbund
Published
2024-09-15 22:00
Modified
2025-01-12 23:00
Summary
Linux Kernel: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann eine Schwachstelle in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2148 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2148.json" }, { "category": "self", "summary": "WID-SEC-2024-2148 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2148" }, { "category": "external", "summary": "Linux CVE Announce vom 2024-09-15", "url": "http://lore.kernel.org/linux-cve-announce/2024091316-CVE-2024-46713-5e49@gregkh/" }, { "category": "external", "summary": "Red Hat Customer Portal", "url": "https://access.redhat.com/security/cve/cve-2024-46713#cve-cvss-v3" }, { "category": "external", "summary": "Red Hat Bugzilla \u2013 Bug 2312221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312221" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-070 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-070.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5782 vom 2024-10-03", "url": "https://lists.debian.org/debian-security-announce/2024/msg00195.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-055 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-055.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3912 vom 2024-10-07", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12815.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7154-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7155-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7154-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:0059 vom 2025-01-08", "url": "https://access.redhat.com/errata/RHSA-2025:0059" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7196-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-0059 vom 2025-01-11", "url": "https://linux.oracle.com/errata/ELSA-2025-0059.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2025-01-12T23:00:00.000+00:00", "generator": { "date": "2025-01-13T09:09:11.461+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-2148", "initial_release_date": "2024-09-15T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon und Debian aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-07T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "12" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c5.10.226", "product": { "name": "Open Source Linux Kernel \u003c5.10.226", "product_id": "T037622" } }, { "category": "product_version", "name": "5.10.226", "product": { "name": "Open Source Linux Kernel 5.10.226", "product_id": "T037622-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.10.226" } } }, { "category": "product_version_range", "name": "\u003c5.15.167", "product": { "name": "Open Source Linux Kernel \u003c5.15.167", "product_id": "T037623" } }, { "category": "product_version", "name": "5.15.167", "product": { "name": "Open Source Linux Kernel 5.15.167", "product_id": "T037623-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.15.167" } } }, { "category": "product_version_range", "name": "\u003c6.1.110", "product": { "name": "Open Source Linux Kernel \u003c6.1.110", "product_id": "T037624" } }, { "category": "product_version", "name": "6.1.110", "product": { "name": "Open Source Linux Kernel 6.1.110", "product_id": "T037624-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.1.110" } } }, { "category": "product_version_range", "name": "\u003c6.6.51", "product": { "name": "Open Source Linux Kernel \u003c6.6.51", "product_id": "T037625" } }, { "category": "product_version", "name": "6.6.51", "product": { "name": "Open Source Linux Kernel 6.6.51", "product_id": "T037625-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.6.51" } } }, { "category": "product_version_range", "name": "\u003c6.10.10", "product": { "name": "Open Source Linux Kernel \u003c6.10.10", "product_id": "T037626" } }, { "category": "product_version", "name": "6.10.10", "product": { "name": "Open Source Linux Kernel 6.10.10", "product_id": "T037626-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.10.10" } } }, { "category": "product_version_range", "name": "\u003c6.11-rc7", "product": { "name": "Open Source Linux Kernel \u003c6.11-rc7", "product_id": "T037627" } }, { "category": "product_version", "name": "6.11-rc7", "product": { "name": "Open Source Linux Kernel 6.11-rc7", "product_id": "T037627-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.11-rc7" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-46713", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle im Linux-Kernel. Dieser Fehler existiert wegen des event-\u003emmap_mutex ist absolut unzureichend, um den AUX-Puffer zu serialisieren. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "2951", "T037624", "67646", "T037625", "T000126", "T037626", "T037627", "398363", "T037622", "T037623", "T004914" ] }, "release_date": "2024-09-15T22:00:00.000+00:00", "title": "CVE-2024-46713" } ] }
RHSA-2025:0059
Vulnerability from csaf_redhat
Published
2025-01-08 01:35
Modified
2025-09-10 15:29
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: perf/aux: Fix AUX buffer serialization (CVE-2024-46713)
* kernel: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (CVE-2024-50208)
* kernel: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (CVE-2024-50252)
* kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (CVE-2024-53122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: perf/aux: Fix AUX buffer serialization (CVE-2024-46713)\n\n* kernel: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (CVE-2024-50208)\n\n* kernel: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (CVE-2024-50252)\n\n* kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (CVE-2024-53122)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:0059", "url": "https://access.redhat.com/errata/RHSA-2025:0059" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2312221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312221" }, { "category": "external", "summary": "2324611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2324611" }, { "category": "external", "summary": "2324898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2324898" }, { "category": "external", "summary": "2329932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2329932" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_0059.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-09-10T15:29:54+00:00", "generator": { "date": "2025-09-10T15:29:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:0059", "initial_release_date": "2025-01-08T01:35:06+00:00", "revision_history": [ { "date": "2025-01-08T01:35:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-01-08T01:35:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T15:29:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 9)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 9)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "product": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "product_id": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@7.4.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug-modules@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug-modules-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug-modules-extra@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-modules@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-modules-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-modules-extra@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "product": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "product_id": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@7.4.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug-devel@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug-devel-matched@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-devel@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-devel-matched@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rtla@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rv@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf@5.14.0-503.21.1.el9_5?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "product": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "product_id": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@7.4.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "product": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "product_id": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@7.4.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf-debuginfo@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rtla@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rv@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf@5.14.0-503.21.1.el9_5?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "product": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "product_id": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@7.4.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-uki-virt@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-uki-virt@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-uki-virt-addons@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "product": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "product_id": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@7.4.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rtla@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rv@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-503.21.1.el9_5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "product": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "product_id": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@7.4.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-core@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "product": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "product_id": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@7.4.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf-debuginfo@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "perf-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "perf-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rtla@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "rv-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "rv-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "rv-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rv@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf@5.14.0-503.21.1.el9_5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:5.14.0-503.21.1.el9_5.src", "product": { "name": "kernel-0:5.14.0-503.21.1.el9_5.src", "product_id": "kernel-0:5.14.0-503.21.1.el9_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-503.21.1.el9_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "product": { "name": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "product_id": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-503.21.1.el9_5?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "product": { "name": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "product_id": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@5.14.0-503.21.1.el9_5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.src", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.src", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.src as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.src", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.src", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.src as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.src", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-46713", "cwe": { "id": "CWE-662", "name": "Improper Synchronization" }, "discovery_date": "2024-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312221" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/aux: Fix AUX buffer serialization\n\nOle reported that event-\u003emmap_mutex is strictly insufficient to\nserialize the AUX buffer, add a per RB mutex to fully serialize it.\n\nNote that in the lock order comment the perf_event::mmap_mutex order\nwas already wrong, that is, it nesting under mmap_lock is not new with\nthis patch.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: perf/aux: Fix AUX buffer serialization", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-46713" }, { "category": "external", "summary": "RHBZ#2312221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312221" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-46713", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46713" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-46713", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-46713" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024091316-CVE-2024-46713-5e49@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024091316-CVE-2024-46713-5e49@gregkh/T" } ], "release_date": "2024-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-01-08T01:35:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2025:0059" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: perf/aux: Fix AUX buffer serialization" }, { "cve": "CVE-2024-50208", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-11-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2324611" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages\n\nAvoid memory corruption while setting up Level-2 PBL pages for the non MR\nresources when num_pages \u003e 256K.\n\nThere will be a single PDE page address (contiguous pages in the case of \u003e\nPAGE_SIZE), but, current logic assumes multiple pages, leading to invalid\nmemory access after 256K PBL entries in the PDE.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-50208" }, { "category": "external", "summary": "RHBZ#2324611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2324611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50208", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50208" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-50208", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50208" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024110806-CVE-2024-50208-08dc@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024110806-CVE-2024-50208-08dc@gregkh/T" } ], "release_date": "2024-11-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-01-08T01:35:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2025:0059" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages" }, { "cve": "CVE-2024-50252", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2024-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2324898" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address\n\nThe device stores IPv6 addresses that are used for encapsulation in\nlinear memory that is managed by the driver.\n\nChanging the remote address of an ip6gre net device never worked\nproperly, but since cited commit the following reproducer [1] would\nresult in a warning [2] and a memory leak [3]. The problem is that the\nnew remote address is never added by the driver to its hash table (and\ntherefore the device) and the old address is never removed from it.\n\nFix by programming the new address when the configuration of the ip6gre\nnet device changes and removing the old one. If the address did not\nchange, then the above would result in increasing the reference count of\nthe address and then decreasing it.\n\n[1]\n # ip link add name bla up type ip6gre local 2001:db8:1::1 remote 2001:db8:2::1 tos inherit ttl inherit\n # ip link set dev bla type ip6gre remote 2001:db8:3::1\n # ip link del dev bla\n # devlink dev reload pci/0000:01:00.0\n\n[2]\nWARNING: CPU: 0 PID: 1682 at drivers/net/ethernet/mellanox/mlxsw/spectrum.c:3002 mlxsw_sp_ipv6_addr_put+0x140/0x1d0\nModules linked in:\nCPU: 0 UID: 0 PID: 1682 Comm: ip Not tainted 6.12.0-rc3-custom-g86b5b55bc835 #151\nHardware name: Nvidia SN5600/VMOD0013, BIOS 5.13 05/31/2023\nRIP: 0010:mlxsw_sp_ipv6_addr_put+0x140/0x1d0\n[...]\nCall Trace:\n \u003cTASK\u003e\n mlxsw_sp_router_netdevice_event+0x55f/0x1240\n notifier_call_chain+0x5a/0xd0\n call_netdevice_notifiers_info+0x39/0x90\n unregister_netdevice_many_notify+0x63e/0x9d0\n rtnl_dellink+0x16b/0x3a0\n rtnetlink_rcv_msg+0x142/0x3f0\n netlink_rcv_skb+0x50/0x100\n netlink_unicast+0x242/0x390\n netlink_sendmsg+0x1de/0x420\n ____sys_sendmsg+0x2bd/0x320\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xd0\n do_syscall_64+0x9e/0x1a0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n[3]\nunreferenced object 0xffff898081f597a0 (size 32):\n comm \"ip\", pid 1626, jiffies 4294719324\n hex dump (first 32 bytes):\n 20 01 0d b8 00 02 00 00 00 00 00 00 00 00 00 01 ...............\n 21 49 61 83 80 89 ff ff 00 00 00 00 01 00 00 00 !Ia.............\n backtrace (crc fd9be911):\n [\u003c00000000df89c55d\u003e] __kmalloc_cache_noprof+0x1da/0x260\n [\u003c00000000ff2a1ddb\u003e] mlxsw_sp_ipv6_addr_kvdl_index_get+0x281/0x340\n [\u003c000000009ddd445d\u003e] mlxsw_sp_router_netdevice_event+0x47b/0x1240\n [\u003c00000000743e7757\u003e] notifier_call_chain+0x5a/0xd0\n [\u003c000000007c7b9e13\u003e] call_netdevice_notifiers_info+0x39/0x90\n [\u003c000000002509645d\u003e] register_netdevice+0x5f7/0x7a0\n [\u003c00000000c2e7d2a9\u003e] ip6gre_newlink_common.isra.0+0x65/0x130\n [\u003c0000000087cd6d8d\u003e] ip6gre_newlink+0x72/0x120\n [\u003c000000004df7c7cc\u003e] rtnl_newlink+0x471/0xa20\n [\u003c0000000057ed632a\u003e] rtnetlink_rcv_msg+0x142/0x3f0\n [\u003c0000000032e0d5b5\u003e] netlink_rcv_skb+0x50/0x100\n [\u003c00000000908bca63\u003e] netlink_unicast+0x242/0x390\n [\u003c00000000cdbe1c87\u003e] netlink_sendmsg+0x1de/0x420\n [\u003c0000000011db153e\u003e] ____sys_sendmsg+0x2bd/0x320\n [\u003c000000003b6d53eb\u003e] ___sys_sendmsg+0x9a/0xe0\n [\u003c00000000cae27c62\u003e] __sys_sendmsg+0x7a/0xd0", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-50252" }, { "category": "external", "summary": "RHBZ#2324898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2324898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50252", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50252" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-50252", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50252" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024110937-CVE-2024-50252-aacc@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024110937-CVE-2024-50252-aacc@gregkh/T" } ], "release_date": "2024-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-01-08T01:35:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2025:0059" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address" }, { "cve": "CVE-2024-53122", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2024-12-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2329932" } ], "notes": [ { "category": "description", "text": "A divide by zero flaw was found in the Linux kernel\u0027s Multipath TCP (MPTCP). This issue could allow a remote user to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust", "title": "Vulnerability summary" }, { "category": "other", "text": "By default, the MPTCP support is disabled in RHEL. This bug is only applicable if enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-53122" }, { "category": "external", "summary": "RHBZ#2329932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2329932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-53122", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53122" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-53122", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53122" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024120252-CVE-2024-53122-f35c@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024120252-CVE-2024-53122-f35c@gregkh/T" } ], "release_date": "2024-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-01-08T01:35:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2025:0059" }, { "category": "workaround", "details": "If enabled, you may disable MPTCP support. For more information please read https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/html/configuring_and_managing_networking/getting-started-with-multipath-tcp_configuring-and-managing-networking#preparing-rhel-to-enable-mptcp-support_getting-started-with-multipath-tcp", "product_ids": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust" } ] }
rhsa-2025:0059
Vulnerability from csaf_redhat
Published
2025-01-08 01:35
Modified
2025-09-10 15:29
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: perf/aux: Fix AUX buffer serialization (CVE-2024-46713)
* kernel: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (CVE-2024-50208)
* kernel: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (CVE-2024-50252)
* kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (CVE-2024-53122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: perf/aux: Fix AUX buffer serialization (CVE-2024-46713)\n\n* kernel: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (CVE-2024-50208)\n\n* kernel: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (CVE-2024-50252)\n\n* kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (CVE-2024-53122)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:0059", "url": "https://access.redhat.com/errata/RHSA-2025:0059" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2312221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312221" }, { "category": "external", "summary": "2324611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2324611" }, { "category": "external", "summary": "2324898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2324898" }, { "category": "external", "summary": "2329932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2329932" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_0059.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-09-10T15:29:54+00:00", "generator": { "date": "2025-09-10T15:29:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:0059", "initial_release_date": "2025-01-08T01:35:06+00:00", "revision_history": [ { "date": "2025-01-08T01:35:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-01-08T01:35:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T15:29:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 9)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 9)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "product": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "product_id": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@7.4.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug-modules@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug-modules-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug-modules-extra@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-modules@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-modules-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-modules-extra@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "product": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "product_id": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@7.4.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug-devel@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-debug-devel-matched@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-devel@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-64k-devel-matched@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rtla@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rv@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-503.21.1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "product": { "name": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "product_id": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf@5.14.0-503.21.1.el9_5?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "product": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "product_id": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@7.4.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "product": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "product_id": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@7.4.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf-debuginfo@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rtla@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rv@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-503.21.1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "product": { "name": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "product_id": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf@5.14.0-503.21.1.el9_5?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "product": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "product_id": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@7.4.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-uki-virt@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-uki-virt@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-uki-virt-addons@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "product": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "product_id": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@7.4.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-core@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rtla@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rv@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-503.21.1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "product": { "name": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "product_id": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-503.21.1.el9_5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "product": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "product_id": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@7.4.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-core@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "product": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "product_id": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@7.4.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf-debuginfo@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "perf-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "perf-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rtla@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "rv-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "rv-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "rv-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rv@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-503.21.1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "product": { "name": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "product_id": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libperf@5.14.0-503.21.1.el9_5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:5.14.0-503.21.1.el9_5.src", "product": { "name": "kernel-0:5.14.0-503.21.1.el9_5.src", "product_id": "kernel-0:5.14.0-503.21.1.el9_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-503.21.1.el9_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "product": { "name": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "product_id": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-503.21.1.el9_5?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "product": { "name": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "product_id": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@5.14.0-503.21.1.el9_5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.src", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.src", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.src as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.src", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "CRB-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.src", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "NFV-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64" }, "product_reference": "bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.src as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.src", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch" }, "product_reference": "kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rtla-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rtla-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.aarch64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.ppc64le", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.s390x as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.s390x", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "rv-0:5.14.0-503.21.1.el9_5.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" }, "product_reference": "rv-0:5.14.0-503.21.1.el9_5.x86_64", "relates_to_product_reference": "RT-9.5.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-46713", "cwe": { "id": "CWE-662", "name": "Improper Synchronization" }, "discovery_date": "2024-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312221" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/aux: Fix AUX buffer serialization\n\nOle reported that event-\u003emmap_mutex is strictly insufficient to\nserialize the AUX buffer, add a per RB mutex to fully serialize it.\n\nNote that in the lock order comment the perf_event::mmap_mutex order\nwas already wrong, that is, it nesting under mmap_lock is not new with\nthis patch.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: perf/aux: Fix AUX buffer serialization", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-46713" }, { "category": "external", "summary": "RHBZ#2312221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312221" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-46713", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46713" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-46713", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-46713" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024091316-CVE-2024-46713-5e49@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024091316-CVE-2024-46713-5e49@gregkh/T" } ], "release_date": "2024-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-01-08T01:35:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2025:0059" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: perf/aux: Fix AUX buffer serialization" }, { "cve": "CVE-2024-50208", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-11-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2324611" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages\n\nAvoid memory corruption while setting up Level-2 PBL pages for the non MR\nresources when num_pages \u003e 256K.\n\nThere will be a single PDE page address (contiguous pages in the case of \u003e\nPAGE_SIZE), but, current logic assumes multiple pages, leading to invalid\nmemory access after 256K PBL entries in the PDE.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-50208" }, { "category": "external", "summary": "RHBZ#2324611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2324611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50208", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50208" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-50208", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50208" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024110806-CVE-2024-50208-08dc@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024110806-CVE-2024-50208-08dc@gregkh/T" } ], "release_date": "2024-11-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-01-08T01:35:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2025:0059" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages" }, { "cve": "CVE-2024-50252", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2024-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2324898" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address\n\nThe device stores IPv6 addresses that are used for encapsulation in\nlinear memory that is managed by the driver.\n\nChanging the remote address of an ip6gre net device never worked\nproperly, but since cited commit the following reproducer [1] would\nresult in a warning [2] and a memory leak [3]. The problem is that the\nnew remote address is never added by the driver to its hash table (and\ntherefore the device) and the old address is never removed from it.\n\nFix by programming the new address when the configuration of the ip6gre\nnet device changes and removing the old one. If the address did not\nchange, then the above would result in increasing the reference count of\nthe address and then decreasing it.\n\n[1]\n # ip link add name bla up type ip6gre local 2001:db8:1::1 remote 2001:db8:2::1 tos inherit ttl inherit\n # ip link set dev bla type ip6gre remote 2001:db8:3::1\n # ip link del dev bla\n # devlink dev reload pci/0000:01:00.0\n\n[2]\nWARNING: CPU: 0 PID: 1682 at drivers/net/ethernet/mellanox/mlxsw/spectrum.c:3002 mlxsw_sp_ipv6_addr_put+0x140/0x1d0\nModules linked in:\nCPU: 0 UID: 0 PID: 1682 Comm: ip Not tainted 6.12.0-rc3-custom-g86b5b55bc835 #151\nHardware name: Nvidia SN5600/VMOD0013, BIOS 5.13 05/31/2023\nRIP: 0010:mlxsw_sp_ipv6_addr_put+0x140/0x1d0\n[...]\nCall Trace:\n \u003cTASK\u003e\n mlxsw_sp_router_netdevice_event+0x55f/0x1240\n notifier_call_chain+0x5a/0xd0\n call_netdevice_notifiers_info+0x39/0x90\n unregister_netdevice_many_notify+0x63e/0x9d0\n rtnl_dellink+0x16b/0x3a0\n rtnetlink_rcv_msg+0x142/0x3f0\n netlink_rcv_skb+0x50/0x100\n netlink_unicast+0x242/0x390\n netlink_sendmsg+0x1de/0x420\n ____sys_sendmsg+0x2bd/0x320\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xd0\n do_syscall_64+0x9e/0x1a0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n[3]\nunreferenced object 0xffff898081f597a0 (size 32):\n comm \"ip\", pid 1626, jiffies 4294719324\n hex dump (first 32 bytes):\n 20 01 0d b8 00 02 00 00 00 00 00 00 00 00 00 01 ...............\n 21 49 61 83 80 89 ff ff 00 00 00 00 01 00 00 00 !Ia.............\n backtrace (crc fd9be911):\n [\u003c00000000df89c55d\u003e] __kmalloc_cache_noprof+0x1da/0x260\n [\u003c00000000ff2a1ddb\u003e] mlxsw_sp_ipv6_addr_kvdl_index_get+0x281/0x340\n [\u003c000000009ddd445d\u003e] mlxsw_sp_router_netdevice_event+0x47b/0x1240\n [\u003c00000000743e7757\u003e] notifier_call_chain+0x5a/0xd0\n [\u003c000000007c7b9e13\u003e] call_netdevice_notifiers_info+0x39/0x90\n [\u003c000000002509645d\u003e] register_netdevice+0x5f7/0x7a0\n [\u003c00000000c2e7d2a9\u003e] ip6gre_newlink_common.isra.0+0x65/0x130\n [\u003c0000000087cd6d8d\u003e] ip6gre_newlink+0x72/0x120\n [\u003c000000004df7c7cc\u003e] rtnl_newlink+0x471/0xa20\n [\u003c0000000057ed632a\u003e] rtnetlink_rcv_msg+0x142/0x3f0\n [\u003c0000000032e0d5b5\u003e] netlink_rcv_skb+0x50/0x100\n [\u003c00000000908bca63\u003e] netlink_unicast+0x242/0x390\n [\u003c00000000cdbe1c87\u003e] netlink_sendmsg+0x1de/0x420\n [\u003c0000000011db153e\u003e] ____sys_sendmsg+0x2bd/0x320\n [\u003c000000003b6d53eb\u003e] ___sys_sendmsg+0x9a/0xe0\n [\u003c00000000cae27c62\u003e] __sys_sendmsg+0x7a/0xd0", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-50252" }, { "category": "external", "summary": "RHBZ#2324898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2324898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50252", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50252" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-50252", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50252" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024110937-CVE-2024-50252-aacc@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024110937-CVE-2024-50252-aacc@gregkh/T" } ], "release_date": "2024-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-01-08T01:35:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2025:0059" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address" }, { "cve": "CVE-2024-53122", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2024-12-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2329932" } ], "notes": [ { "category": "description", "text": "A divide by zero flaw was found in the Linux kernel\u0027s Multipath TCP (MPTCP). This issue could allow a remote user to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust", "title": "Vulnerability summary" }, { "category": "other", "text": "By default, the MPTCP support is disabled in RHEL. This bug is only applicable if enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-53122" }, { "category": "external", "summary": "RHBZ#2329932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2329932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-53122", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53122" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-53122", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53122" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024120252-CVE-2024-53122-f35c@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024120252-CVE-2024-53122-f35c@gregkh/T" } ], "release_date": "2024-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-01-08T01:35:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2025:0059" }, { "category": "workaround", "details": "If enabled, you may disable MPTCP support. For more information please read https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/html/configuring_and_managing_networking/getting-started-with-multipath-tcp_configuring-and-managing-networking#preparing-rhel-to-enable-mptcp-support_getting-started-with-multipath-tcp", "product_ids": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "AppStream-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "BaseOS-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "CRB-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "CRB-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "NFV-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "NFV-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:bpftool-debuginfo-0:7.4.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.src", "RT-9.5.0.Z.MAIN:kernel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-64k-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-64k-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-cross-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debug-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-devel-matched-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-doc-0:5.14.0-503.21.1.el9_5.noarch", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-headers-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-core-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-uki-virt-addons-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-core-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:libperf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rtla-0:5.14.0-503.21.1.el9_5.x86_64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.aarch64", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.ppc64le", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.s390x", "RT-9.5.0.Z.MAIN:rv-0:5.14.0-503.21.1.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust" } ] }
fkie_cve-2024-46713
Vulnerability from fkie_nvd
Published
2024-09-13 15:15
Modified
2024-09-13 16:37
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
perf/aux: Fix AUX buffer serialization
Ole reported that event->mmap_mutex is strictly insufficient to
serialize the AUX buffer, add a per RB mutex to fully serialize it.
Note that in the lock order comment the perf_event::mmap_mutex order
was already wrong, that is, it nesting under mmap_lock is not new with
this patch.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/aux: Fix AUX buffer serialization\n\nOle reported that event-\u003emmap_mutex is strictly insufficient to\nserialize the AUX buffer, add a per RB mutex to fully serialize it.\n\nNote that in the lock order comment the perf_event::mmap_mutex order\nwas already wrong, that is, it nesting under mmap_lock is not new with\nthis patch." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: perf/aux: Se corrige la serializaci\u00f3n del b\u00fafer AUX. Ole inform\u00f3 que event-\u0026gt;mmap_mutex es estrictamente insuficiente para serializar el b\u00fafer AUX, agregue un mutex por RB para serializarlo por completo. Tenga en cuenta que en el comentario de orden de bloqueo, el orden perf_event::mmap_mutex ya estaba mal, es decir, su anidaci\u00f3n bajo mmap_lock no es nueva con este parche." } ], "id": "CVE-2024-46713", "lastModified": "2024-09-13T16:37:22.997", "metrics": {}, "published": "2024-09-13T15:15:15.010", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/2ab9d830262c132ab5db2f571003d80850d56b2a" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/52d13d224fdf1299c8b642807fa1ea14d693f5ff" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/7882923f1cb88dc1a17f2bf0c81b1fc80d44db82" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/9dc7ad2b67772cfb94ceb3b0c9c4023c2463215d" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/b9b6882e243b653d379abbeaa64a500182aba370" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/c4b69bee3f4ef76809288fe6827bc14d4ae788ef" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Undergoing Analysis" }
ssa-355557
Vulnerability from csaf_siemens
Published
2025-08-12 00:00
Modified
2025-08-12 00:00
Summary
SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2
Notes
Summary
SINEC OS before V3.2 contains third-party components with multiple vulnerabilities.
Siemens has released new versions for the affected products and recommends to update to the latest versions.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SINEC OS before V3.2 contains third-party components with multiple vulnerabilities.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-355557.html" }, { "category": "self", "summary": "SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-355557.json" } ], "title": "SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2", "tracking": { "current_release_date": "2025-08-12T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-355557", "initial_release_date": "2025-08-12T00:00:00Z", "revision_history": [ { "date": "2025-08-12T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "interim", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003c3.2", "product": { "name": "RUGGEDCOM RST2428P (6GK6242-6PA00)", "product_id": "1", "product_identification_helper": { "model_numbers": [ "6GK6242-6PA00" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RST2428P (6GK6242-6PA00)" }, { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003c3.2", "product": { "name": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family", "product_id": "2" } } ], "category": "product_name", "name": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family" }, { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003c3.2", "product": { "name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family", "product_id": "3" } } ], "category": "product_name", "name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-47316", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfsd: NULL dereference in nfs3svc_encode_getaclres.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2021-47316" }, { "cve": "CVE-2022-48666", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "scsi: core: use-after-free vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2022-48666" }, { "cve": "CVE-2022-48827", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "NFSD: vulnerability caused by loff_t overflow on the server when a client reads near the maximum offset, causing the server to return an EINVAL error, which the client retries indefinitely, instead of handling out-of-range READ requests by returning a short result with an EOF flag.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2022-48827" }, { "cve": "CVE-2022-48828", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NFSD: Vulnerability caused by an underflow in ia_size due to a mismatch between signed and unsigned 64-bit file size values, which can cause issues when handling large file sizes from NFS clients.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2022-48828" }, { "cve": "CVE-2022-48829", "cwe": { "id": "CWE-253", "name": "Incorrect Check of Function Return Value" }, "notes": [ { "category": "summary", "text": "NFSD: Vulnerability handling large file sizes for NFSv3 improperly capping client size values larger than s64_max, leading to unexpected behavior and potential data corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2022-48829" }, { "cve": "CVE-2022-49034", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "sh: cpuinfo: warning for CONFIG_CPUMASK_OFFSTACK. When CONFIG_CPUMASK_OFFSTACK and CONFIG_DEBUG_PER_CPU_MAPS are selected, cpu_max_bits_warn() generates a runtime warning when showing /proc/cpuinfo.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2022-49034" }, { "cve": "CVE-2023-52887", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: can: j1939: vulnerability related to error handling for closely received RTS messages in xtp_rx_rts_session_new, which is addressed by replacing less informative backtraces with a new method that provides clearer error messages and allows for early termination of problematic sessions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52887" }, { "cve": "CVE-2023-52917", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir(). The debugfs_create_dir() function returns error pointers. It never returns NULL. So use IS_ERR() to check it.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52917" }, { "cve": "CVE-2024-9681", "cwe": { "id": "CWE-697", "name": "Incorrect Comparison" }, "notes": [ { "category": "summary", "text": "When curl is asked to use HSTS, the expiry time for a subdomain might\r\noverwrite a parent domain\u0027s cache entry, making it end sooner or later than\r\notherwise intended.\r\n\r\nThis affects curl using applications that enable HSTS and use URLs with the\r\ninsecure `HTTP://` scheme and perform transfers with hosts like\r\n`x.example.com` as well as `example.com` where the first host is a subdomain\r\nof the second host.\r\n\r\n(The HSTS cache either needs to have been populated manually or there needs to\r\nhave been previous HTTPS accesses done as the cache needs to have entries for\r\nthe domains involved to trigger this problem.)\r\n\r\nWhen `x.example.com` responds with `Strict-Transport-Security:` headers, this\r\nbug can make the subdomain\u0027s expiry timeout *bleed over* and get set for the\r\nparent domain `example.com` in curl\u0027s HSTS cache.\r\n\r\nThe result of a triggered bug is that HTTP accesses to `example.com` get\r\nconverted to HTTPS for a different period of time than what was asked for by\r\nthe origin server. If `example.com` for example stops supporting HTTPS at its\r\nexpiry time, curl might then fail to access `http://example.com` until the\r\n(wrongly set) timeout expires. This bug can also expire the parent\u0027s entry\r\n*earlier*, thus making curl inadvertently switch back to insecure HTTP earlier\r\nthan otherwise intended.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-9681" }, { "cve": "CVE-2024-36484", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: relax socket state check at accept time.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-36484" }, { "cve": "CVE-2024-36894", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-36894" }, { "cve": "CVE-2024-36901", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a chance that ip6_dst_idev() returns NULL in ip6_output().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-36901" }, { "cve": "CVE-2024-36938", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Denial of Service Vulnerability in the Linux Kernel: bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue Fix NULL pointer data-races in sk_psock_skb_ingress_enqueue() which syzbot reported.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-36938" }, { "cve": "CVE-2024-36974", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP. If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev-\u003enum_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-36974" }, { "cve": "CVE-2024-36978", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: sched: sch_multiq: possible OOB write in multiq_tune() q-\u003ebands will be assigned to qopt-\u003ebands to execute subsequent code logic after kmalloc. So the old q-\u003ebands should not be used in kmalloc. Otherwise, an out-of-bounds write will occur.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-36978" }, { "cve": "CVE-2024-37078", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: kernel vulnerability due to lack of writeback flag waiting. When the log writer starts a writeback for segment summary blocks or a super root block that use the backing devices page cache, it does not wait for the ongoing folio/page writeback, resulting in an inconsistent writeback state.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-37078" }, { "cve": "CVE-2024-38586", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "r8169: possible ring buffer corruption on fragmented Tx packets. Vulnerability on the RTL8125b when transmitting small fragmented packets, whereby invalid entries were inserted into the transmit ring buffer, subsequently leading to calls to dma_unmap_single() with a null address. This was caused by rtl8169_start_xmit() not noticing changes to nr_frags which may occur when small packets are padded (to work around hardware quirks) in rtl8169_tso_csum_v2().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-38586" }, { "cve": "CVE-2024-38619", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb-storage: alauda: Check whether the media is initialized. The member \"uzonesize\" of struct alauda_info will remain 0 if alauda_init_media() fails, potentially causing divide errors in alauda_read_data() and alauda_write_lba().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-38619" }, { "cve": "CVE-2024-39468", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "smb: client: Deadlock in smb2_find_smb_tcon().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39468" }, { "cve": "CVE-2024-39469", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors The error handling in nilfs_empty_dir() when a directory folio/page read fails is incorrect, as in the old ext2 implementation, and if the folio/page cannot be read or nilfs_check_folio() fails, it will falsely determine the directory as empty and corrupt the file system. In addition, since nilfs_empty_dir() does not immediately return on a failed folio/page read, but continues to loop, this can cause a long loop with I/O if i_size of the directory\u0027s inode is also corrupted, causing the log writer thread to wait and hang, as reported by syzbot. Fix these issues by making nilfs_empty_dir() immediately return a false value (0) if it fails to get a directory folio/page.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39469" }, { "cve": "CVE-2024-39482", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bcache: Variable length array abuse in btree_iter.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39482" }, { "cve": "CVE-2024-39484", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "mmc: davinci: Vulnerability from resource leaks. Using __exit for the remove function results in the remove callback being discarded with CONFIG_MMC_DAVINCI=y. When such a device gets unbound (e.g. using sysfs or hotplug), the driver is just removed without the cleanup being performed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39484" }, { "cve": "CVE-2024-39487", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39487" }, { "cve": "CVE-2024-39495", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "greybus: use-after-free vulnerability in gb_interface_release due to race condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39495" }, { "cve": "CVE-2024-39499", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "vmci: speculation leaks by sanitizing event in event_deliver(). event_msg is controlled by user-space, event_msg-\u003eevent_data.event is passed to event_deliver() and used as an index without sanitization, leading to information leaks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39499" }, { "cve": "CVE-2024-39501", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drivers: core: synchronize really_probe() and dev_uevent(). Synchronize the dev-\u003edriver usage in really_probe() and dev_uevent(). These can run in different threads, what can result in the following race condition for dev-\u003edriver uninitialization.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39501" }, { "cve": "CVE-2024-39502", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "ionic: use after netif_napi_del(). When queues are started, netif_napi_add() and napi_enable() are called. If there are 4 queues and only 3 queues are used for the current configuration, only 3 queues\u0027 napi should be registered and enabled. The ionic_qcq_enable() checks whether the .poll pointer is not NULL for enabling only the using queue\u0027 napi. Unused queues\u0027 napi will not be registered by netif_napi_add(), so the .poll pointer indicates NULL. But it couldn\u0027t distinguish whether the napi was unregistered or not because netif_napi_del() doesn\u0027t reset the .poll pointer to NULL. So, ionic_qcq_enable() calls napi_enable() for the queue, which was unregistered by netif_napi_del().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39502" }, { "cve": "CVE-2024-39503", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "netfilter: ipset: race between namespace cleanup and gc in the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39503" }, { "cve": "CVE-2024-39505", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/komeda: check for error-valued pointer. komeda_pipeline_get_state() may return an error-valued pointer, thus check the pointer for negative or null value before dereferencing.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39505" }, { "cve": "CVE-2024-39506", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet. In lio_vf_rep_copy_packet() pg_info-\u003epage is compared to a NULL value, but then it is unconditionally passed to skb_add_rx_frag(), which could lead to null pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39506" }, { "cve": "CVE-2024-39509", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "HID: core: remove unnecessary WARN_ON() in implement(). There is a warning in a call to implement() when trying to write a value into a field of smaller size in an output report. Since implement() already has a warn message printed out with the help of hid_warn() and value in question gets trimmed with: ... value \u0026= m; ... WARN_ON may be considered superfluous.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39509" }, { "cve": "CVE-2024-40901", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40901" }, { "cve": "CVE-2024-40902", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "jfs: xattr: buffer overflow for invalid xattr. When an xattr size is not what is expected, it is printed out to the kernel log in hex format as a form of debugging. But when that xattr size is bigger than the expected size, printing it out can cause an access off the end of the buffer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40902" }, { "cve": "CVE-2024-40904", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "USB: class: cdc-wdm: CPU lockup caused by excessive log messages.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40904" }, { "cve": "CVE-2024-40905", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ipv6: possible race in __fib6_drop_pcpu_from().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40905" }, { "cve": "CVE-2024-40912", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: mac80211: deadlock in ieee80211_sta_ps_deliver_wakeup().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40912" }, { "cve": "CVE-2024-40916", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found When reading EDID fails and driver reports no modes available, the DRM core adds an artificial 1024x786 mode to the connector.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40916" }, { "cve": "CVE-2024-40929", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: iwlwifi: mvm: check n_ssids before accessing the ssids.In some versions of cfg80211, the ssids poinet might be a valid one even though n_ssids is 0. Accessing the pointer in this case will cuase an out-of-bound access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40929" }, { "cve": "CVE-2024-40931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mptcp: ensure snd_una is properly initialized on connect.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40931" }, { "cve": "CVE-2024-40932", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/exynos/vidi: memory leak in .get_modes().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40932" }, { "cve": "CVE-2024-40934", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() Fix a memory leak on logi_dj_recv_send_report() error path.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40934" }, { "cve": "CVE-2024-40941", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "wifi: iwlwifi: mvm: don\u0027t read past the mfuart notifcation. In case the firmware sends a notification that claims it has more data than it has, it will read past that was allocated for the notification.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40941" }, { "cve": "CVE-2024-40942", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "notes": [ { "category": "summary", "text": "wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects The hwmp code use objects of type mesh_preq_queue, added to a list in ieee80211_if_mesh, to keep track of mpath we need to resolve. If the mpath gets deleted, ex mesh interface is removed, the entries in that list will never get cleaned.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40942" }, { "cve": "CVE-2024-40943", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "ocfs2: fix races between hole punching and AIO+DIO.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40943" }, { "cve": "CVE-2024-40945", "cwe": { "id": "CWE-393", "name": "Return of Wrong Status Code" }, "notes": [ { "category": "summary", "text": "iommu: Return right value in iommu_sva_bind_device() iommu_sva_bind_device() should return either a sva bond handle or an ERR_PTR value in error cases. Existing drivers (idxd and uacce) only check the return value with IS_ERR(). This could potentially lead to a kernel NULL pointer dereference issue if the function returns NULL instead of an error pointer. In reality, this doesn\u0027t cause any problems because iommu_sva_bind_device() only returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40945" }, { "cve": "CVE-2024-40947", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ima: Avoid blocking in RCU read-side critical section, a panic happens in ima_match_policy.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40947" }, { "cve": "CVE-2024-40958", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "netns: Make get_net_ns() handle zero refcount net Syzkaller hit a warning: refcount_t: addition on 0; use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40958" }, { "cve": "CVE-2024-40959", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40959" }, { "cve": "CVE-2024-40960", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ipv6: prevent possible NULL dereference in rt6_probe() syzbot caught a NULL dereference in rt6_probe() [1] Bail out if __in6_dev_get() returns NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40960" }, { "cve": "CVE-2024-40961", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ipv6: prevent possible NULL deref in fib6_nh_init() syzbot reminds us that in6_dev_get() can return NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40961" }, { "cve": "CVE-2024-40963", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mips: bmips: BCM6358: Some device have CBR address set to 0 causing kernel panic when arch_sync_dma_for_cpu_all is called.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40963" }, { "cve": "CVE-2024-40968", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "MIPS:The standard PCIe configuration read-write interface is used to access the configuration space of the peripheral PCIe devices of the mips processor after the PCIe link surprise down, it can generate kernel panic caused by \"Data bus error\".", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40968" }, { "cve": "CVE-2024-40971", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "f2fs: remove clear SB_INLINECRYPT flag in default_options In f2fs_remount, SB_INLINECRYPT flag will be clear and re-set. If create new file or open file during this gap, these files will not use inlinecrypt. Worse case, it may lead to data corruption if wrappedkey_v0 is enable.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40971" }, { "cve": "CVE-2024-40974", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "powerpc/pseries: stack corruption at runtime when plpar_hcall9() stores results past the end of the array.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40974" }, { "cve": "CVE-2024-40976", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/lima: There is a race condition in which a rendering job might take just long enough to trigger the drm sched job timeout handler but also still complete before the hard reset is done by the timeout handler. This runs into race conditions not expected by the timeout handler. In some very specific cases it currently may result in a refcount imbalance on lima_pm_idle, with a stack dump.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40976" }, { "cve": "CVE-2024-40978", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: qedi: crash while reading debugfs attribute. The qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly on a __user pointer, which results into the crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40978" }, { "cve": "CVE-2024-40980", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drop_monitor: replace spin_lock by raw_spin_lock trace_drop_common() is called with preemption disabled, and it acquires a spin_lock. This is problematic for RT kernels because spin_locks are sleeping locks in this configuration, which causes the following splat.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40980" }, { "cve": "CVE-2024-40981", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "batman-adv: empty buckets in batadv_purge_orig_ref() are pointing to soft lockups in batadv_purge_orig_ref().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40981" }, { "cve": "CVE-2024-40983", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tipc: possible crash before doing decryption.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40983" }, { "cve": "CVE-2024-40984", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ACPICA: Revert \"ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40984" }, { "cve": "CVE-2024-40987", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: UBSAN warning in kv_dpm.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40987" }, { "cve": "CVE-2024-40988", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/radeon: UBSAN warning in kv_dpm.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40988" }, { "cve": "CVE-2024-40990", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ptp: integer overflow in max_vclocks_store.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40990" }, { "cve": "CVE-2024-40995", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net/sched: act_api: possible infinite loop in tcf_idr_check_alloc().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40995" }, { "cve": "CVE-2024-41000", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "block/ioctl: prefer different overflow check Running syzkaller with the newly reintroduced signed integer overflow sanitizer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41000" }, { "cve": "CVE-2024-41004", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tracing: Build event generation tests only as modules The kprobes and synth event generation test modules add events and lock (get a reference) those event file reference in module init function, and unlock and delete it in module exit function. This is because those are designed for playing as modules. If we make those modules as built-in, those events are left locked in the kernel, and never be removed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41004" }, { "cve": "CVE-2024-41005", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "netpoll: race condition in netpoll_owner_active KCSAN detected a race condition in netpoll.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41005" }, { "cve": "CVE-2024-41006", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "netrom: a memory leak in nr_heartbeat_expiry().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41006" }, { "cve": "CVE-2024-41007", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "notes": [ { "category": "summary", "text": "tcp: avoid too many retransmit packets If a TCP socket is using TCP_USER_TIMEOUT.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41007" }, { "cve": "CVE-2024-41009", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "bpf: Fix overrunning reservations in ringbuf.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41009" }, { "cve": "CVE-2024-41012", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "filelock: Remove locks reliably when fcntl/close race is detected When fcntl_setlk() races with close(), it removes the created lock with do_lock_file_wait().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41012" }, { "cve": "CVE-2024-41015", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: add bounds checking to ocfs2_check_dir_entry(). This adds sanity checks for ocfs2_dir_entry to make sure all members of ocfs2_dir_entry don\u0027t stray beyond valid memory region.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41015" }, { "cve": "CVE-2024-41017", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jfs: vulnerability involves the risk of accessing memory beyond the end of ealist, which can lead to undefined behavior or crashes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41017" }, { "cve": "CVE-2024-41020", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "filelock: race condition vulnerability between fcntl and close operations, which can lead to issues in the recovery compatibility path.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41020" }, { "cve": "CVE-2024-41022", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability involves a signedness problem in sdma_v4_0_process_trap_irq(), which can lead to incorrect handling of values and potential errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41022" }, { "cve": "CVE-2024-41034", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: kernel bug on rename operation of broken directory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41034" }, { "cve": "CVE-2024-41035", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "USB: core: duplicate endpoint bug.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41035" }, { "cve": "CVE-2024-41040", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net/sched: UAF when resolving a clash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41040" }, { "cve": "CVE-2024-41041", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "udp: small race window.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41041" }, { "cve": "CVE-2024-41044", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ppp: claimed-as-LCP but actually malformed packets.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41044" }, { "cve": "CVE-2024-41046", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix double free in detach The number of the currently released descriptor is never incremented which results in the same skb being released multiple times.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41046" }, { "cve": "CVE-2024-41049", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: filelock: fix potential use-after-free in posix_lock_inode Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode(). The request pointer had been changed earlier to point to a lock entry that was added to the inode\u0027s list. However, before the tracepoint could fire, another task raced in and freed that lock. Fix this by moving the tracepoint inside the spinlock, which should ensure that this doesn\u0027t happen.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41049" }, { "cve": "CVE-2024-41055", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: mm: prevent derefencing NULL ptr in pfn_section_valid() Commit 5ec8e8ea8b77 (\"mm/sparsemem: fix race in accessing memory_section-\u003eusage\") changed pfn_section_valid() to add a READ_ONCE() call around \"ms-\u003eusage\" to fix a race with section_deactivate() where ms-\u003eusage can be cleared. The READ_ONCE() call, by itself, is not enough to prevent NULL pointer dereference. We need to check its value before dereferencing it.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41055" }, { "cve": "CVE-2024-41059", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hfsplus: uninit-value in copy_name.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41059" }, { "cve": "CVE-2024-41063", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Bluetooth: hci_core: deadlock at destroy_workqueue().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41063" }, { "cve": "CVE-2024-41064", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "powerpc/eeh: possible crash when edev-\u003epdev changes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41064" }, { "cve": "CVE-2024-41065", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "powerpc/pseries: Reading the dispatch trace log from /sys/kernel/debug/powerpc/dtl/cpu-* results in a BUG().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41065" }, { "cve": "CVE-2024-41068", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "s390/sclp: sclp_init() failure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41068" }, { "cve": "CVE-2024-41070", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "KVM: PPC: Book3S HV: UAF in kvm_spapr_tce_attach_iommu_group().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41070" }, { "cve": "CVE-2024-41072", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check In \u0027cfg80211_wext_siwscan()\u0027, add extra check whether number of channels passed via \u0027ioctl(sock, SIOCSIWSCAN, ...)\u0027 doesn\u0027t exceed IW_MAX_FREQUENCIES and reject invalid request with -EINVAL otherwise.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41072" }, { "cve": "CVE-2024-41077", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "null_blk: validation error on block size.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41077" }, { "cve": "CVE-2024-41078", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "btrfs: qgroup: quota root leak after quota disable failure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41078" }, { "cve": "CVE-2024-41081", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ila: block BH in ila_output().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41081" }, { "cve": "CVE-2024-41087", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ata: libata-core: double free on error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41087" }, { "cve": "CVE-2024-41089", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/nouveau/dispnv04: null pointer dereference in nv17_tv_get_hd_modes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41089" }, { "cve": "CVE-2024-41090", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tap: add missing verification for short frame. Missing to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tap_get_user_xdp()--\u003eskb_set_network_header() may assume the size is more than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41090" }, { "cve": "CVE-2024-41091", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tun: add missing verification for short frame. Missing to check against the validity of the frame length in the tun_xdp_one() path could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tun_xdp_one--\u003eeth_type_trans() may access the Ethernet header although it can be less than ETH_HLEN. Once transmitted, this could either causeout-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41091" }, { "cve": "CVE-2024-41092", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/i915/gt: potential UAF by revoke of fence registers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41092" }, { "cve": "CVE-2024-41095", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/nouveau/dispnv04: null pointer dereference in nv17_tv_get_ld_modes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41095" }, { "cve": "CVE-2024-41097", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: atm: cxacru: incomplete endpoint checking in cxacru_bind().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41097" }, { "cve": "CVE-2024-42076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: can: j1939: unused data in j1939_send_one().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42076" }, { "cve": "CVE-2024-42077", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: DIO failure due to insufficient transaction credits.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42077" }, { "cve": "CVE-2024-42082", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "xdp: unused WARN() in __xdp_reg_mem_model().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42082" }, { "cve": "CVE-2024-42084", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ftruncate: passing a negative length accidentally succeeds in truncating to file size between 2GiB and 4GiB.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42084" }, { "cve": "CVE-2024-42086", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "iio: chemical: bme680: overflows in compensate() functions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42086" }, { "cve": "CVE-2024-42087", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/panel: ilitek-ili9881c: warning with GPIO controllers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42087" }, { "cve": "CVE-2024-42092", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "gpio: davinci: There can be out of chips-\u003eirqs array boundaries access in davinci_gpio_probe().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42092" }, { "cve": "CVE-2024-42093", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net/dpaa2: explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack can cause potential stack overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42093" }, { "cve": "CVE-2024-42094", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net/iucv: explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack can cause potential stack overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42094" }, { "cve": "CVE-2024-42095", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "serial: 8250_omap: Erroneous timeout can be triggered, and it may lead to storm of interrupts.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42095" }, { "cve": "CVE-2024-42101", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/nouveau: null pointer dereference in nouveau_connector_get_modes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42101" }, { "cve": "CVE-2024-42105", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42105" }, { "cve": "CVE-2024-42143", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "orangefs: out-of-bounds fsid access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42143" }, { "cve": "CVE-2024-42145", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "IB/core: an unbounded UMAD receive list, poses a risk of uncontrolled growth.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42145" }, { "cve": "CVE-2024-42148", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bnx2x: multiple UBSAN array-index-out-of-bounds.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42148" }, { "cve": "CVE-2024-42152", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nvmet: possible leak when destroy a ctrl during qp establishment.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42152" }, { "cve": "CVE-2024-42153", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "i2c: pnx: potential deadlock warning from del_timer_sync() call in isr.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42153" }, { "cve": "CVE-2024-42154", "cwe": { "id": "CWE-805", "name": "Buffer Access with Incorrect Length Value" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don\u0027t see anything checking that TCP_METRICS_ATTR_SADDR_IPV4 is at least 4 bytes long, and the policy doesn\u0027t have an entry for this attribute at all (neither does it for IPv6 but v6 is manually validated).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42154" }, { "cve": "CVE-2024-42161", "cwe": { "id": "CWE-457", "name": "Use of Uninitialized Variable" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42161" }, { "cve": "CVE-2024-42223", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: dvb-frontends: tda10048: integer overflow state-\u003extal_hz can be up to 16M, so it can overflow a 32 bit integer when multiplied by pll_mfactor.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42223" }, { "cve": "CVE-2024-42224", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: dsa: mv88e6xxx: wrong check on empty list.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42224" }, { "cve": "CVE-2024-42229", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "crypto: aead,cipher - key buffer after use not zeroized.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42229" }, { "cve": "CVE-2024-42232", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "libceph: fix race between delayed_work() and ceph_monc_stop() The way the delayed work is handled in ceph_monc_stop() is prone to races with mon_fault() and possibly also finish_hunting(). Both of these can requeue the delayed work which wouldn\u0027t be canceled by any of the following code in case that happens after cancel_delayed_work_sync() runs -- __close_session() doesn\u0027t mess with the delayed work in order to avoid interfering with the hunting interval logic. This part was missed in(libceph: behave in mon_fault() if cur_mon \u003c \") and use-after-free can still ensue on monc and objects that hang off of it, with monc-\u003e auth and monc-\u003emonmap being particularly susceptible to quickly being reused.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42232" }, { "cve": "CVE-2024-42236", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: gadget: configfs: OOB read/write in usb_string_copy().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42236" }, { "cve": "CVE-2024-42244", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "notes": [ { "category": "summary", "text": "USB: serial: mos7840: fix crash on resume Since(\"USB: serial: use generic method if no alternative is provided in usb serial layer\"), USB serial core calls the generic resume implementation when the driver has not provided one. This can trigger a crash on resume with mos7840 since support for multiple read URBs was added back in 2011. Specifically, both port read URBs are now submitted on resume for open ports, but the context pointer of the second URB is left set to the core rather than mos7840 port structure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42244" }, { "cve": "CVE-2024-42247", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wireguard: allowedips: unaligned 64-bit memory accesses.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42247" }, { "cve": "CVE-2024-43098", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "i3c: Use i3cdev-\u003edesc-\u003einfo instead of calling i3c_device_get_info() to avoid deadlock. A deadlock may happen since the i3c_master_register() acquires i3cbus-\u003elock twice.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43098" }, { "cve": "CVE-2024-43861", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: usb: qmi_wwan: memory leak for not ip packets.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43861" }, { "cve": "CVE-2024-43867", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/nouveau: prime: refcount underflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43867" }, { "cve": "CVE-2024-43871", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu() It will cause memory leakage when use driver API devm_free_percpu() to free memory allocated by devm_alloc_percpu(), fixed by using devres_release() instead of devres_destroy() within devm_free_percpu().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43871" }, { "cve": "CVE-2024-43879", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: cfg80211: Currently NL80211_RATE_INFO_HE_RU_ALLOC_2x996 is not handled in cfg80211_calculate_bitrate_he(), leading to warning.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43879" }, { "cve": "CVE-2024-43880", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mlxsw: spectrum_acl_erp: object nesting warning.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43880" }, { "cve": "CVE-2024-43882", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "exec: the execution may gain unintended privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43882" }, { "cve": "CVE-2024-43883", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: vhci-hcd: vulnerability due to the vhci-hcd driver dropping references before new ones were gained, potentially leading to the use of stale pointers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43883" }, { "cve": "CVE-2024-43889", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "padata: vulnerability due to a possible divide-by-zero error in padata_mt_helper() during bootup, caused by an uninitialized chunk_size being zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43889" }, { "cve": "CVE-2024-43890", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tracing: vulnerability due to an overflow in get_free_elt(), which could lead to infinite loops and CPU hangs when the tracing map becomes full.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43890" }, { "cve": "CVE-2024-43893", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "serial: core: vulnerability due to a missing check for uartclk being zero, leading to a potential divide-by-zero error when calling ioctl TIOCSSERIAL with an invalid baud_base.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43893" }, { "cve": "CVE-2024-43894", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/client: vulnerability due to a potential null pointer dereference in drm_client_modeset_probe() when drm_mode_duplicate() fails, which was fixed by adding a check.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43894" }, { "cve": "CVE-2024-43907", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu/pm: null pointer dereference in apply_state_adjust_rules.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43907" }, { "cve": "CVE-2024-43908", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: null pointer dereference in ras_manager.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43908" }, { "cve": "CVE-2024-43914", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "md/raid5: BUG_ON() while continue reshape after reassembling.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43914" }, { "cve": "CVE-2024-44935", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "sctp: Fix null-ptr-deref in reuseport_add_sock(). A Null Pointer Dereference in reuseport_add_sock() while accessing sk2-\u003esk_reuseport_cb . The repro first creates a listener with SO_REUSEPORT. Then, it creates another listener on the same port and concurrently closes the first listener. The second listen() calls reuseport_add_sock() with the first listener as sk2, where sk2-\u003esk_reuseport_cb is not expected to be cleared concurrently, but the close() does clear it by reuseport_detach_sock().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44935" }, { "cve": "CVE-2024-44944", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, otherwise LSB of the expectation object address is leaked to userspace.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44944" }, { "cve": "CVE-2024-44949", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "parisc: fix a possible DMA corruption ARCH_DMA_MINALIGN was defined as 16 - this is too small - it may be possible that two unrelated 16-byte allocations share a cache line. If one of these allocations is written using DMA and the other is written using cached write, the value that was written with DMA may be corrupted.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44949" }, { "cve": "CVE-2024-44952", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "driver core: vulnerability due to a potential deadlock due to improper handling of device attributes and driver detachment, which has been fixed by using synchronize_rcu() to prevent race conditions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44952" }, { "cve": "CVE-2024-44954", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: line6: vulnerability involved racy access to the midibuf in the ALSA line6 driver, which has been fixed by using a spinlock to prevent concurrent access issues.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44954" }, { "cve": "CVE-2024-44960", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: gadget: core: Check for unset descriptor. It needs to be reassured that the descriptor has been set before looking at maxpacket. This fixes a null pointer panic in this case. This may happen if the gadget doesn\u0027t properly set up the endpoint for the current speed, or the gadget descriptors are malformed and the descriptor for the speed/endpoint are not found. No current gadget driver is known to have this problem, but this may cause a hard-to-find bug during development of new gadgets.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44960" }, { "cve": "CVE-2024-44965", "cwe": { "id": "CWE-229", "name": "Improper Handling of Values" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix pti_clone_pgtable() alignment assumption Guenter reported dodgy crashes on an i386-nosmp build using GCC-11 that had the form of endless traps until entry stack exhaust and then #DF from the stack guard. It turned out that pti_clone_pgtable() had alignment assumptions on the start address, notably it hard assumes start is PMD aligned. This is true on x86_64, but very much not true on i386. These assumptions can cause the end condition to malfunction, leading to a \u0027short\u0027 clone. Guess what happens when the user mapping has a short copy of the entry text? Use the correct increment form for addr to avoid alignment assumptions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44965" }, { "cve": "CVE-2024-44969", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "s390/sclp: vulnerability could lead to data corruption if a Store Data operation is interrupted and the halt attempt fails, which was resolved by preventing the release of data buffers in such cases.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44969" }, { "cve": "CVE-2024-44971", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "net: dsa: bcm_sf2: vulnerability caused a memory leak by not decrementing the reference count after finding and removing PHY devices, which has been fixed by adding a call to phy_device_free() to balance the reference count.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44971" }, { "cve": "CVE-2024-44987", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent UAF in ip6_send_skb().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44987" }, { "cve": "CVE-2024-44988", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: dsa: mv88e6xxx: vulnerability caused an out-of-bound access in the mv88e6xxx driver due to an ATU violation causing the SPID to exceed DSA_MAX_PORTS, which was resolved by ensuring the SPID stays within the valid range.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44988" }, { "cve": "CVE-2024-44989", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: bonding: fix xfrm real_dev null pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44989" }, { "cve": "CVE-2024-44990", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: bonding: fix null pointer deref in bond_ipsec_offload_ok We must check if there is an active slave before dereferencing the pointer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44990" }, { "cve": "CVE-2024-44995", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: hns3: a deadlock problem when config TC during resetting.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44995" }, { "cve": "CVE-2024-44998", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "atm: idt77252: use after free in dequeue_rx().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44998" }, { "cve": "CVE-2024-44999", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "gtp: missing network headers in gtp_dev_xmit().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44999" }, { "cve": "CVE-2024-45003", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "vfs: Some filesystems(eg. ext4 with ea_inode feature, ubifs with xattr) may do inode lookup in the inode evicting callback function, if the inode lookup is operated under the inode lru traversing context, deadlock problems may happen.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-45003" }, { "cve": "CVE-2024-45006", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "xhci: Panther point NULL pointer deref at full-speed re-enumeration.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-45006" }, { "cve": "CVE-2024-45008", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Input: missing limit on max slots results in too large allocation at input_mt_init_slots().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-45008" }, { "cve": "CVE-2024-45021", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "memcg_write_event_control(): a user-triggerable oops.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-45021" }, { "cve": "CVE-2024-45025", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE copy_fd_bitmaps.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-45025" }, { "cve": "CVE-2024-46673", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "scsi: aacraid: Fix double-free on probe failure. aac_probe_one() calls hardware-specific init functions through the aac_driver_ident::init pointer, all of which eventually call down to aac_init_adapter(). If aac_init_adapter() fails after allocating memory for aac_dev::queues, it frees the memory but does not clear that member. After the hardware-specific init function returns an error, aac_probe_one() goes down an error path that frees the memory pointed to by aac_dev::queues, resulting in a double-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46673" }, { "cve": "CVE-2024-46674", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "usb: dwc3: st: fix probed platform device ref count on probe error path. The probe function never performs any paltform device allocation, thus error path \"undo_platform_dev_alloc\" is entirely bogus. It drops the reference count from the platform device being probed. If error path is triggered, this will lead to unbalanced device reference counts and premature release of device resources, thus possible use-after-free when releasing remaining devm-managed resources.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46674" }, { "cve": "CVE-2024-46675", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: dwc3: core: A vulnerability where the USB core could access an invalid event buffer address during runtime suspend, potentially causing SMMU faults and other memory issues in Exynos platforms.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46675" }, { "cve": "CVE-2024-46676", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfc: pn533: Add poll mod list filling check. In case of im_protocols value is 1 and tm_protocols value is 0 this combination successfully passes the check \u0027if (!im_protocols \u0026\u0026 !tm_protocols)\u0027 in the nfc_start_poll(). But then after pn533_poll_create_mod_list() call in pn533_start_poll() poll mod list will remain empty and dev-\u003epoll_mod_count will remain 0 which lead to division by zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46676" }, { "cve": "CVE-2024-46677", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "gtp: fix NULL pointer dereference. When sockfd_lookup() fails, gtp_encap_enable_socket() returns a NULL pointer, but its callers only check for error pointers thus miss the NULL pointer case.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46677" }, { "cve": "CVE-2024-46679", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ethtool: check device is present when getting link settings.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46679" }, { "cve": "CVE-2024-46685", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "pinctrl: single: fix NULL dereference in pcs_get_function(). pinmux_generic_get_function() can return NULL and the pointer \u0027function\u0027 was dereferenced without checking against NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46685" }, { "cve": "CVE-2024-46689", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "soc: qcom: cmd-db: Map shared memory as WC, not WB Linux does not write into cmd-db region. This region of memory is write protected by XPU. XPU may sometime falsely detect clean cache eviction as \"write\" into the write protected region leading to secure interrupt which causes an endless loop somewhere in Trust Zone.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46689" }, { "cve": "CVE-2024-46702", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "thunderbolt: Mark XDomain as unplugged when router is removed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46702" }, { "cve": "CVE-2024-46707", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 On a system with a GICv3, if a guest hasn\u0027t been configured with GICv3 and that the host is not capable of GICv2 emulation, a write to any of the ICC_*SGI*_EL1 registers is trapped to EL2.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46707" }, { "cve": "CVE-2024-46713", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "perf/aux: AUX buffer serialization.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46713" }, { "cve": "CVE-2024-46714", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Skip wbscl_set_scaler_filter if filter is null Callers can pass null in filter (i.e. from returned from the function wbscl_get_filter_coeffs_16p) and a null check is added to ensure that is not the case.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46714" }, { "cve": "CVE-2024-46719", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: typec: ucsi: Fix null pointer dereference in trace ucsi_register_altmode checks IS_ERR for the alt pointer and treats NULL as valid. When CONFIG_TYPEC_DP_ALTMODE is not enabled, ucsi_register_displayport returns NULL which causes a NULL pointer dereference in trace. Rather than return NULL, call typec_port_register_altmode to register DisplayPort alternate mode as a non-controllable mode when CONFIG_TYPEC_DP_ALTMODE is not enabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46719" }, { "cve": "CVE-2024-46721", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "apparmor: fix possible NULL pointer dereference. profile-\u003eparent-\u003edents[AAFS_PROF_DIR] could be NULL only if its parent is made from __create_missing_ancestors(..) and \u0027ent-\u003eold\u0027 is NULL in aa_replace_profiles(..). In that case, it must return an error code and the code, -ENOENT represents its state that the path of its parent is not existed yet.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46721" }, { "cve": "CVE-2024-46722", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability due to an out-of-bounds read warning when accessing mc_data[i-1].", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46722" }, { "cve": "CVE-2024-46723", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability due to an out-of-bounds read warning when accessing ucode[].", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46723" }, { "cve": "CVE-2024-46724", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability in drm/amdgpu that involved an out-of-bounds read of df_v1_7_channel_number.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46724" }, { "cve": "CVE-2024-46725", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability caused by an out-of-bounds write warning due to an unchecked ring type value.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46725" }, { "cve": "CVE-2024-46731", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/pm: vulnerability caused by an out-of-bounds read warning where the index i - 1U can exceed the bounds of the mc_data[] array when i is zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46731" }, { "cve": "CVE-2024-46737", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nvmet-tcp: kernel crash if commands allocation fails.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46737" }, { "cve": "CVE-2024-46738", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "VMCI: use-after-free when removing resource in vmci_resource_remove().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46738" }, { "cve": "CVE-2024-46739", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "uio_hv_generic: kernel NULL pointer dereference in hv_uio_rescind.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46739" }, { "cve": "CVE-2024-46740", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "binder: UAF caused by offsets overwrite.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46740" }, { "cve": "CVE-2024-46743", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: of/irq: Prevent device address out-of-bounds read in interrupt map walk.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46743" }, { "cve": "CVE-2024-46744", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: Squashfs: sanity check symbolic link size.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46744" }, { "cve": "CVE-2024-46745", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: Input: uinput - reject requests with unreasonable number of slots When exercising uinput interface syzkaller may try setting up device with a really large number of slots, which causes memory allocation failure in input_mt_init_slots(). While this allocation failure is handled properly and request is rejected, it results in syzkaller reports. Additionally, such request may put undue burden on the system which will try to free a lot of memory for a bogus request. Fix it by limiting allowed number of slots to 100. This can easily be extended if we see devices that can track more than 100 contacts.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46745" }, { "cve": "CVE-2024-46747", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "HID: cougar: slab-out-of-bounds Read in cougar_report_fixup. Report_fixup for the Cougar 500k Gaming Keyboard was not verifying that the report descriptor size was correct before accessing it.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46747" }, { "cve": "CVE-2024-46750", "cwe": { "id": "CWE-413", "name": "Improper Resource Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: PCI: Add missing bridge lock to pci_bus_lock().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46750" }, { "cve": "CVE-2024-46755", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id(). mwifiex_get_priv_by_id() returns the priv pointer corresponding to the bss_num and bss_type, but without checking if the priv is actually currently in use. Unused priv pointers do not have a wiphy attached to them which can lead to NULL pointer dereferences further down the callstack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46755" }, { "cve": "CVE-2024-46756", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hwmon: (w83627ehf) underflows seen when writing limit attributes DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number such as -9223372036854775808 is provided by the user.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46756" }, { "cve": "CVE-2024-46757", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hwmon: (nct6775-core) underflows seen when writing limit attributes DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number such as -9223372036854775808 is provided by the user.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46757" }, { "cve": "CVE-2024-46758", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hwmon: (lm95234) underflows seen when writing limit attributes DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number such as -9223372036854775808 is provided by the user.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46758" }, { "cve": "CVE-2024-46759", "cwe": { "id": "CWE-124", "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: hwmon: (adc128d818) Fix underflows seen when writing limit attributes DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number such as -9223372036854775808 is provided by the user. Fix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46759" }, { "cve": "CVE-2024-46761", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "pci/hotplug/pnv_php: hotplug driver crash on Powernv.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46761" }, { "cve": "CVE-2024-46763", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "fou: null-ptr-deref in GRO.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46763" }, { "cve": "CVE-2024-46771", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "can: bcm: Remove proc entry when dev is unregistered.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46771" }, { "cve": "CVE-2024-46777", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "udf: Avoid excessive partition lengths Avoid mounting filesystems where the partition would overflow the 32-bits used for block number. Also refuse to mount filesystems where the partition length is so large we cannot safely index bits in a block bitmap.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46777" }, { "cve": "CVE-2024-46780", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: vulnerability caused by the need for mutual exclusion using nilfs-\u003ens_sem when accessing superblock buffers in sysfs attribute show methods to prevent issues with pointer dereferencing and memory access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46780" }, { "cve": "CVE-2024-46781", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: vulnerability involves a use-after-free bug during mount-time recovery, where inodes with recovered data are not freed if an error occurs before the log writer starts, leading to potential memory issues.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46781" }, { "cve": "CVE-2024-46782", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ila: call nf_unregister_net_hooks() use-after-free Read in ila_nf_input.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46782" }, { "cve": "CVE-2024-46783", "cwe": { "id": "CWE-229", "name": "Improper Handling of Values" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: fix return value of tcp_bpf_sendmsg().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46783" }, { "cve": "CVE-2024-46791", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open The mcp251x_hw_wake() function is called with the mpc_lock mutex held and disables the interrupt handler so that no interrupts can be processed while waking the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46791" }, { "cve": "CVE-2024-46798", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ASoC: dapm: vulnerability is an use-after-free bug where snd_pcm_suspend_all() accessed a freed snd_soc_pcm_runtime object during system suspension, detected with KASAN configurations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46798" }, { "cve": "CVE-2024-46800", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "sch/netem: use after free in netem_dequeue If netem_dequeue() enqueues packet to inner qdisc and that qdisc returns __NET_XMIT_STOLEN.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46800" }, { "cve": "CVE-2024-46804", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Add array index check for hdcp ddc access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46804" }, { "cve": "CVE-2024-46814", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Check msg_id before processing transcation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46814" }, { "cve": "CVE-2024-46815", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[].", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46815" }, { "cve": "CVE-2024-46817", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46817" }, { "cve": "CVE-2024-46818", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Check gpio_id before used as array index.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46818" }, { "cve": "CVE-2024-46819", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: the warning dereferencing obj for nbio_v7_4 if ras_manager obj null, don\u0027t print NBIO err data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46819" }, { "cve": "CVE-2024-46822", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46822" }, { "cve": "CVE-2024-46828", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "sched: sch_cake: fix bulk flow accounting logic for host fairness In sch_cake, we keep track of the count of active bulk flows per host, when running in dst/src host fairness mode, which is used as the round-robin weight when iterating through flows.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46828" }, { "cve": "CVE-2024-46829", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "rtmutex: Drop rt_mutex::wait_lock before scheduling. rt_mutex_handle_deadlock() is called with rt_mutex::wait_lock held. In the good case it returns with the lock held and in the deadlock case it emits a warning and goes into an endless scheduling loop with the lock held, which triggers the \u0027scheduling in atomic\u0027 warning. Unlock rt_mutex::wait_lock in the dead lock case before issuing the warning and dropping into the schedule for ever loop.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46829" }, { "cve": "CVE-2024-46832", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "MIPS: cevt-r4k: Don\u0027t call get_c0_compare_int if timer irq is installed This avoids warning: [ 0.118053] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:283 Caused by get_c0_compare_int on secondary CPU. We also skipped saving IRQ number to struct clock_event_device *cd as it\u0027s never used by clockevent core, as per comments it\u0027s only meant for \"non CPU local devices\".", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46832" }, { "cve": "CVE-2024-46840", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "btrfs: clean up our handling of refs == 0 in snapshot delete. In reada we BUG_ON(refs == 0), which may be problematic because there is no lock on the extent leave, potentially leading to a transient incorrect answer. In walk_down_proc, BUG_ON(refs == 0) is also used, which could occur due to extent tree corruption. This has been changed to return -EUCLEAN. In do_walk_down() this case is caught and handled correctly, however -EIO is returned, whereas -EUCLEAN would a more appropriate error code. Finally in walk_up_proc, BUG_ON(refs == 0) is also used, it has also been converted to proper error handling.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46840" }, { "cve": "CVE-2024-46844", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "um: line: always fill *error_out in setup_one_line() The pointer isn\u0027t initialized by callers, but I have encountered cases where it\u0027s still printed; initialize it in all possible cases in setup_one_line().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46844" }, { "cve": "CVE-2024-47143", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "dma-debug: possible deadlock on radix_lock. radix_lock() shouldn\u0027t be held while holding dma_hash_entry[idx].lock otherwise, there\u0027s a possible deadlock scenario when dma debug API is called holding rq_lock().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47143" }, { "cve": "CVE-2024-47659", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "smack: tcp: vulnerability in Smack\u2019s TCP/IPv4 labeling allows packets to be incorrectly labeled, enabling unauthorized data writing from one label to another.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47659" }, { "cve": "CVE-2024-47660", "cwe": { "id": "CWE-413", "name": "Improper Resource Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: fsnotify: clear PARENT_WATCHED flags lazily In some setups directories can have many (usually negative) dentries. Hence __fsnotify_update_child_dentry_flags() function can take a significant amount of time. Since the bulk of this function happens under inode-\u003ei_lock this causes a significant contention on the lock when we remove the watch from the directory as the __fsnotify_update_child_dentry_flags() call from fsnotify_recalc_mask() races with __fsnotify_update_child_dentry_flags() calls from __fsnotify_parent() happening on children. This can lead upto softlockup reports reported by users. Fix the problem by calling fsnotify_update_children_dentry_flags() to set PARENT_WATCHED flags only when parent starts watching children. When parent stops watching children, clear false positive PARENT_WATCHED flags lazily in __fsnotify_parent() for each accessed child.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47660" }, { "cve": "CVE-2024-47663", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "staging: iio: frequency: ad9834: In ad9834_write_frequency() clk_get_rate() can return 0. In such case ad9834_calc_freqreg() call will lead to division by zero. Checking \u0027if (fout \u003e (clk_freq / 2))\u0027 doesn\u0027t protect in case of \u0027fout\u0027 is 0. ad9834_write_frequency() is called from ad9834_write(), where fout is taken from text buffer, which can contain any value.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47663" }, { "cve": "CVE-2024-47667", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "PCI: keystone: Missing workaround for Errata #i2037 (AM65x SR 1.0).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47667" }, { "cve": "CVE-2024-47668", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "lib/generic-radix-tree.c: race in __genradix_ptr_alloc().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47668" }, { "cve": "CVE-2024-47669", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: state management vulnerability in error path of log writing function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47669" }, { "cve": "CVE-2024-47679", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "vfs: race between evice_inodes() and find_inode()\u0026iput().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47679" }, { "cve": "CVE-2024-47684", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: check skb is non-NULL in tcp_rto_delta_us()\r\n\r\nWe have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic\r\nkernel that are running ceph and recently hit a null ptr dereference in\r\ntcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also\r\nsaw it getting hit from the RACK case as well. Here are examples of the oops\r\nmessages we saw in each of those cases:\r\n\r\nJul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020\r\nJul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode\r\nJul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page\r\nJul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0\r\nJul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI\r\nJul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu\r\nJul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/09/2023\r\nJul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 \u003c48\u003e 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3\r\nJul 26 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246\r\nJul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX: 20c49ba5e353f7cf RCX: 0000000000000000\r\nJul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60\r\nJul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8\r\nJul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900\r\nJul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30\r\nJul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000\r\nJul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\r\nJul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0\r\nJul 26 15:05:02 rx [11061395.913822] PKRU: 55555554\r\nJul 26 15:05:02 rx [11061395.916786] Call Trace:\r\nJul 26 15:05:02 rx [11061395.919488]\r\nJul 26 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f\r\nJul 26 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9\r\nJul 26 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380\r\nJul 26 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0\r\nJul 26 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50\r\nJul 26 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0\r\nJul 26 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20\r\nJul 26 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450\r\nJul 26 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140\r\nJul 26 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90\r\nJul 26 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0\r\nJul 26 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40\r\nJul 26 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220\r\nJul 26 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240\r\nJul 26 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0\r\nJul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240\r\nJul 26 15:05:02 rx [11061395.999866] call_timer_fn+0x32/0x130\r\nJul 26 15:05:02 rx [11061396.003782] __run_timers.part.0+0x180/0x280\r\nJul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10\r\nJul 26 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30\r\nJul 26 15:05:02 rx [11061396.017718] ? lapic_next_even\r\n---truncated---", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47684" }, { "cve": "CVE-2024-47685", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()\r\n\r\nsyzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending garbage on the four reserved tcp bits (th-\u003eres1)\r\n\r\nUse skb_put_zero() to clear the whole TCP header, as done in nf_reject_ip_tcphdr_put()\r\n\r\nBUG: KMSAN: uninit-value in nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255\r\n nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255\r\n nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344\r\n nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48\r\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\r\n nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288\r\n nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161\r\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\r\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\r\n nf_hook include/linux/netfilter.h:269 [inline]\r\n NF_HOOK include/linux/netfilter.h:312 [inline]\r\n ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310\r\n __netif_receive_skb_one_core net/core/dev.c:5661 [inline]\r\n __netif_receive_skb+0x1da/0xa00 net/core/dev.c:5775\r\n process_backlog+0x4ad/0xa50 net/core/dev.c:6108\r\n __napi_poll+0xe7/0x980 net/core/dev.c:6772\r\n napi_poll net/core/dev.c:6841 [inline]\r\n net_rx_action+0xa5a/0x19b0 net/core/dev.c:6963\r\n handle_softirqs+0x1ce/0x800 kernel/softirq.c:554\r\n __do_softirq+0x14/0x1a kernel/softirq.c:588\r\n do_softirq+0x9a/0x100 kernel/softirq.c:455\r\n __local_bh_enable_ip+0x9f/0xb0 kernel/softirq.c:382\r\n local_bh_enable include/linux/bottom_half.h:33 [inline]\r\n rcu_read_unlock_bh include/linux/rcupdate.h:908 [inline]\r\n __dev_queue_xmit+0x2692/0x5610 net/core/dev.c:4450\r\n dev_queue_xmit include/linux/netdevice.h:3105 [inline]\r\n neigh_resolve_output+0x9ca/0xae0 net/core/neighbour.c:1565\r\n neigh_output include/net/neighbour.h:542 [inline]\r\n ip6_finish_output2+0x2347/0x2ba0 net/ipv6/ip6_output.c:141\r\n __ip6_finish_output net/ipv6/ip6_output.c:215 [inline]\r\n ip6_finish_output+0xbb8/0x14b0 net/ipv6/ip6_output.c:226\r\n NF_HOOK_COND include/linux/netfilter.h:303 [inline]\r\n ip6_output+0x356/0x620 net/ipv6/ip6_output.c:247\r\n dst_output include/net/dst.h:450 [inline]\r\n NF_HOOK include/linux/netfilter.h:314 [inline]\r\n ip6_xmit+0x1ba6/0x25d0 net/ipv6/ip6_output.c:366\r\n inet6_csk_xmit+0x442/0x530 net/ipv6/inet6_connection_sock.c:135\r\n __tcp_transmit_skb+0x3b07/0x4880 net/ipv4/tcp_output.c:1466\r\n tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline]\r\n tcp_connect+0x35b6/0x7130 net/ipv4/tcp_output.c:4143\r\n tcp_v6_connect+0x1bcc/0x1e40 net/ipv6/tcp_ipv6.c:333\r\n __inet_stream_connect+0x2ef/0x1730 net/ipv4/af_inet.c:679\r\n inet_stream_connect+0x6a/0xd0 net/ipv4/af_inet.c:750\r\n __sys_connect_file net/socket.c:2061 [inline]\r\n __sys_connect+0x606/0x690 net/socket.c:2078\r\n __do_sys_connect net/socket.c:2088 [inline]\r\n __se_sys_connect net/socket.c:2085 [inline]\r\n __x64_sys_connect+0x91/0xe0 net/socket.c:2085\r\n x64_sys_call+0x27a5/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:43\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nUninit was stored to memory at:\r\n nf_reject_ip6_tcphdr_put+0x60c/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:249\r\n nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344\r\n nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48\r\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\r\n nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288\r\n nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161\r\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\r\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\r\n nf_hook include/linux/netfilter.h:269 [inline]\r\n NF_HOOK include/linux/netfilter.h:312 [inline]\r\n ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310\r\n __netif_receive_skb_one_core\r\n---truncated---", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47685" }, { "cve": "CVE-2024-47692", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfsd: return -EINVAL when namelen is 0\r\nWhen we have a corrupted main.sqlite in /var/lib/nfs/nfsdcld/, it may result in namelen being 0, which will cause memdup_user() to return ZERO_SIZE_PTR.\r\nWhen we access the name.data that has been assigned the value of ZERO_SIZE_PTR in nfs4_client_to_reclaim(), null pointer dereference is triggered.\r\n\r\n[ T1205] ==================================================================\r\n[ T1205] BUG: KASAN: null-ptr-deref in nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] Read of size 1 at addr 0000000000000010 by task nfsdcld/1205\r\n[ T1205]\r\n[ T1205] CPU: 11 PID: 1205 Comm: nfsdcld Not tainted 5.10.0-00003-g2c1423731b8d #406\r\n[ T1205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-buildvm-ppc64le-16.ppc.fedoraproject.org-3.fc31 04/01/2014\r\n[ T1205] Call Trace:\r\n[ T1205] dump_stack+0x9a/0xd0\r\n[ T1205] ? nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] __kasan_report.cold+0x34/0x84\r\n[ T1205] ? nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] kasan_report+0x3a/0x50\r\n[ T1205] nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] ? nfsd4_release_lockowner+0x410/0x410\r\n[ T1205] cld_pipe_downcall+0x5ca/0x760\r\n[ T1205] ? nfsd4_cld_tracking_exit+0x1d0/0x1d0\r\n[ T1205] ? down_write_killable_nested+0x170/0x170\r\n[ T1205] ? avc_policy_seqno+0x28/0x40\r\n[ T1205] ? selinux_file_permission+0x1b4/0x1e0\r\n[ T1205] rpc_pipe_write+0x84/0xb0\r\n[ T1205] vfs_write+0x143/0x520\r\n[ T1205] ksys_write+0xc9/0x170\r\n[ T1205] ? __ia32_sys_read+0x50/0x50\r\n[ T1205] ? ktime_get_coarse_real_ts64+0xfe/0x110\r\n[ T1205] ? ktime_get_coarse_real_ts64+0xa2/0x110\r\n[ T1205] do_syscall_64+0x33/0x40\r\n[ T1205] entry_SYSCALL_64_after_hwframe+0x67/0xd1\r\n[ T1205] RIP: 0033:0x7fdbdb761bc7\r\n[ T1205] Code: 0f 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 514\r\n[ T1205] RSP: 002b:00007fff8c4b7248 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\r\n[ T1205] RAX: ffffffffffffffda RBX: 000000000000042b RCX: 00007fdbdb761bc7\r\n[ T1205] RDX: 000000000000042b RSI: 00007fff8c4b75f0 RDI: 0000000000000008\r\n[ T1205] RBP: 00007fdbdb761bb0 R08: 0000000000000000 R09: 0000000000000001\r\n[ T1205] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000042b\r\n[ T1205] R13: 0000000000000008 R14: 00007fff8c4b75f0 R15: 0000000000000000\r\n[ T1205] ==================================================================", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47692" }, { "cve": "CVE-2024-47696", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nRDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency\r\n\r\nIn the commit aee2424246f9 (\"RDMA/iwcm: Fix a use-after-free related to destroying CM IDs\"), the function flush_workqueue is invoked to flush the work queue iwcm_wq.\r\n\r\nBut at that time, the work queue iwcm_wq was created via the function alloc_ordered_workqueue without the flag WQ_MEM_RECLAIM.\r\n\r\nBecause the current process is trying to flush the whole iwcm_wq, if iwcm_wq doesn\u0027t have the flag WQ_MEM_RECLAIM, verify that the current process is not reclaiming memory or running on a workqueue which doesn\u0027t have the flag WQ_MEM_RECLAIM as that can break forward-progress guarantee leading to a deadlock.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47696" }, { "cve": "CVE-2024-47697", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error\r\n\r\nEnsure index in rtl2830_pid_filter does not exceed 31 to prevent out-of-bounds access.\r\n\r\ndev-\u003efilters is a 32-bit value, so set_bit and clear_bit functions should only operate on indices from 0 to 31. If index is 32, it will attempt to access a non-existent 33rd bit, leading to out-of-bounds access.\r\nChange the boundary check from index \u003e 32 to index \u003e= 32 to resolve this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47697" }, { "cve": "CVE-2024-47698", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drivers: media: dvb-frontends/rtl2832: An out-of-bounds access occurs if rtl2832_pid_filter exceed 31, which was not verified.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47698" }, { "cve": "CVE-2024-47699", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix potential null-ptr-deref in nilfs_btree_insert()\r\n\r\nPatch series \"nilfs2: fix potential issues with empty b-tree nodes\".\r\n\r\nThis series addresses three potential issues with empty b-tree nodes that can occur with corrupted filesystem images, including one recently discovered by syzbot.\r\n\r\n\r\nThis patch (of 3):\r\n\r\nIf a b-tree is broken on the device, and the b-tree height is greater than 2 (the level of the root node is greater than 1) even if the number of child nodes of the b-tree root is 0, a NULL pointer dereference occurs in nilfs_btree_prepare_insert(), which is called from nilfs_btree_insert().\r\n\r\nThis is because, when the number of child nodes of the b-tree root is 0, nilfs_btree_do_lookup() does not set the block buffer head in any of path[x].bp_bh, leaving it as the initial value of NULL, but if the level of the b-tree root node is greater than 1, nilfs_btree_get_nonroot_node(), which accesses the buffer memory of path[x].bp_bh, is called.\r\n\r\nFix this issue by adding a check to nilfs_btree_root_broken(), which performs sanity checks when reading the root node from the device, to detect this inconsistency.\r\n\r\nThanks to Lizhi Xu for trying to solve the bug and clarifying the cause early on.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47699" }, { "cve": "CVE-2024-47701", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid OOB when system.data xattr changes underneath the filesystem.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47701" }, { "cve": "CVE-2024-47705", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblock: fix potential invalid pointer dereference in blk_add_partition\r\n\r\nThe blk_add_partition() function initially used a single if-condition (IS_ERR(part)) to check for errors when adding a partition. This was modified to handle the specific case of -ENXIO separately, allowing the function to proceed without logging the error in this case. However, this change unintentionally left a path where md_autodetect_dev() could be called without confirming that part is a valid pointer.\r\n\r\nThis commit separates the error handling logic by splitting the initial if-condition, improving code readability and handling specific error scenarios explicitly. The function now distinguishes the general error case from -ENXIO without altering the existing behavior of md_autodetect_dev() calls.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47705" }, { "cve": "CVE-2024-47706", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblock, bfq: fix possible UAF for bfqq-\u003ebic with merge chain\r\n\r\nIn this case, IO from Process 1 will get bfqq2 from BIC1 first, and then\r\nget bfqq3 through merge chain, and finially handle IO by bfqq3.\r\nHowerver, current code will think bfqq2 is owned by BIC1, like initial\r\nstate, and set bfqq2-\u003ebic to BIC1.\r\n\r\nAllocated by task 20776:\r\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\r\n kasan_set_track+0x25/0x30 mm/kasan/common.c:52\r\n __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328\r\n kasan_slab_alloc include/linux/kasan.h:188 [inline]\r\n slab_post_alloc_hook mm/slab.h:763 [inline]\r\n slab_alloc_node mm/slub.c:3458 [inline]\r\n kmem_cache_alloc_node+0x1a4/0x6f0 mm/slub.c:3503\r\n ioc_create_icq block/blk-ioc.c:370 [inline]\r\n---truncated---", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47706" }, { "cve": "CVE-2024-47709", "cwe": { "id": "CWE-825", "name": "Expired Pointer Dereference" }, "notes": [ { "category": "summary", "text": "can: bcm: A warning is triggered when connect() is issued again for a socket whose connect()ed device has been unregistered. However, if the socket is just close()d without the 2nd connect(), the remaining bo-\u003ebcm_proc_read triggers unnecessary remove_proc_entry() in bcm_release().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47709" }, { "cve": "CVE-2024-47710", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "sock_map: vulnerability result of adding a cond_resched() in sock_hash_free() to prevent CPU soft lockups when destroying maps with a large number of buckets.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47710" }, { "cve": "CVE-2024-47712", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "wifi: wilc1000: vulnerability caused by a potential RCU dereference issue in wilc_parse_join_bss_param by storing the TSF value in a local variable before releasing the RCU lock to prevent use-after-free errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47712" }, { "cve": "CVE-2024-47713", "cwe": { "id": "CWE-664", "name": "Improper Control of a Resource Through its Lifetime" }, "notes": [ { "category": "summary", "text": "wifi: mac80211: vulnerability caused by implementing a two-phase skb reclamation in ieee80211_do_stop() to avoid warnings and potential issues caused by calling __dev_queue_xmit() with interrupts disabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47713" }, { "cve": "CVE-2024-47718", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "wifi: rtw88: vulnerability may lead to a use-after-free (UAF) error if firmware loading is not properly synchronized during USB initialization and disconnection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47718" }, { "cve": "CVE-2024-47723", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix out-of-bounds in dbNextAG() and diAlloc()\r\n\r\nIn dbNextAG() , there is no check for the case where bmp-\u003edb_numag is greater or same than MAXAG due to a polluted image, which causes an out-of-bounds. Therefore, a bounds check should be added in dbMount().\r\n\r\nAnd in dbNextAG(), a check for the case where agpref is greater than bmp-\u003edb_numag should be added, so an out-of-bounds exception should be prevented.\r\n\r\nAdditionally, a check for the case where agno is greater or same than MAXAG should be added in diAlloc() to prevent out-of-bounds.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47723" }, { "cve": "CVE-2024-47735", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "RDMA/hns: missuse of spin_lock_irq()/spin_unlock_irq() when spin_lock_irqsave()/spin_lock_irqrestore() was hold.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47735" }, { "cve": "CVE-2024-47737", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: nfsd: call cache_put if xdr_reserve_space returns NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47737" }, { "cve": "CVE-2024-47739", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "padata: missing integer wrap around can cause deadlock on seq_nr overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47739" }, { "cve": "CVE-2024-47740", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Inf2fs: Require FMODE_WRITE for atomic write ioctls. The F2FS ioctls for starting and committing atomic writes check for inode_owner_or_capable(), but this does not give LSMs like SELinux or Landlock an opportunity to deny the write access - if the caller\u0027s FSUID matches the inode\u0027s UID, inode_owner_or_capable() immediately returns true.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47740" }, { "cve": "CVE-2024-47742", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "firmware_loader: Block path traversal Most firmware names are hardcoded strings, or are constructed from fairly constrained format strings where the dynamic parts are just some hex numbers or such. However, there are a couple codepaths in the kernel where firmware file names contain string components that are passed through from a device or semi-privileged userspace.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47742" }, { "cve": "CVE-2024-47747", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition. In the ether3_probe function, a timer is initialized with a callback function ether3_ledoff, bound to \u0026prev(dev)-\u003etimer. Once the timer is started, there is a risk of a race condition if the module or device is removed, triggering the ether3_remove function to perform cleanup.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47747" }, { "cve": "CVE-2024-47748", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "vhost_vdpa: assign irq bypass producer token correctly.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47748" }, { "cve": "CVE-2024-47749", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "RDMA/cxgb4: Added NULL check for lookup_atid. The lookup_atid() function can return NULL if the ATID is invalid or does not exist in the identifier table, which could lead to dereferencing a null pointer without a check in the `act_establish()` and `act_open_rpl()` functions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47749" }, { "cve": "CVE-2024-47756", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "PCI: keystone: Fix if-statement expression in ks_pcie_quirk(). This code accidentally uses \u0026\u0026 where || was intended. It potentially results in a NULL dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47756" }, { "cve": "CVE-2024-47757", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "nilfs2: potential oob read in nilfs_btree_check_delete(). The function nilfs_btree_check_delete(), which checks whether degeneration to direct mapping occurs before deleting a b-tree entry, causes memory access outside the block buffer when retrieving the maximum key if the root node has no entries.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47757" }, { "cve": "CVE-2024-48881", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-48881" }, { "cve": "CVE-2024-49851", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "notes": [ { "category": "summary", "text": "tpm: Clean up TPM space after command failure tpm_dev_transmit prepares the TPM space before attempting command transmission. However if the command fails no rollback of this preparation is done. This can result in transient handles being leaked if the device is subsequently closed with no further commands performed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49851" }, { "cve": "CVE-2024-49858", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption The TPM event log table is a Linux specific construct, where the data produced by the GetEventLog() boot service is cached in memory, and passed on to the OS using an EFI configuration table. The use of EFI_LOADER_DATA here results in the region being left unreserved in the E820 memory map constructed by the EFI stub, and this is the memory description that is passed on to the incoming kernel by kexec, which is therefore unaware that the region should be reserved. Even though the utility of the TPM2 event log after a kexec is questionable, any corruption might send the parsing code off into the weeds and crash the kernel.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49858" }, { "cve": "CVE-2024-49860", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "CPI: sysfs: validate return type of _STR method Only buffer objects are valid return values of _STR. If something else is returned description_show() will access invalid memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49860" }, { "cve": "CVE-2024-49863", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "vhost/scsi: null-ptr-dereference in vhost_scsi_get_req().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49863" }, { "cve": "CVE-2024-49867", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "btrfs: wait for fixup workers before stopping cleaner kthread during umount During unmount, at close_ctree().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49867" }, { "cve": "CVE-2024-49868", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "btrfs: a NULL pointer dereference when failed to start a new trasacntion.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49868" }, { "cve": "CVE-2024-49875", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfsd: map the EBADMSG to nfserr_io to avoid warning Ext4 will throw -EBADMSG through ext4_readdir when a checksum error occurs.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49875" }, { "cve": "CVE-2024-49877", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: When doing cleanup, if flags do not have OCFS2_BH_READAHEAD set, it may trigger NULL pointer dereference in the following ocfs2_set_buffer_uptodate() if bh is NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49877" }, { "cve": "CVE-2024-49878", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "resource: Because drivers/dax/kmem.c calls add_memory_driver_managed() during onlining CXL memory, which makes \"System RAM (kmem)\" a descendant of \"CXL Window X\". This confuses region_intersects(), which expects all \"System RAM\" resources to be at the top level of iomem_resource.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49878" }, { "cve": "CVE-2024-49879", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm: omapdrm: alloc_ordered_workqueue may return NULL pointer and cause NULL pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49879" }, { "cve": "CVE-2024-49881", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: update orig_path in ext4_find_extent().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49881" }, { "cve": "CVE-2024-49882", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ext4: In ext4_ext_try_to_merge_up(), path[1].p_bh should be set to NULL after it has been released, otherwise it may be released twice.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49882" }, { "cve": "CVE-2024-49883", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ext4: In ext4_ext_insert_extent(), if the path is reallocated in ext4_ext_create_new_leaf(), the stale path will be used and cause use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49883" }, { "cve": "CVE-2024-49884", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix slab-use-after-free in ext4_split_extent_at().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49884" }, { "cve": "CVE-2024-49889", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: avoid use-after-free in ext4_ext_show_leaf()\r\n\r\nIn ext4_find_extent(), path may be freed by error or be reallocated, so\r\nusing a previously saved *ppath may have been freed and thus may trigger\r\nuse-after-free, as follows:\r\n\r\next4_split_extent\r\n path = *ppath;\r\n ext4_split_extent_at(ppath)\r\n path = ext4_find_extent(ppath)\r\n ext4_split_extent_at(ppath)\r\n // ext4_find_extent fails to free path\r\n // but zeroout succeeds\r\n ext4_ext_show_leaf(inode, path)\r\n eh = path[depth].p_hdr\r\n // path use-after-free !!!\r\n\r\nSimilar to ext4_split_extent_at(), we use *ppath directly as an input to\r\next4_ext_show_leaf(). Fix a spelling error by the way.\r\n\r\nSame problem in ext4_ext_handle_unwritten_extents(). Since \u0027path\u0027 is only\r\nused in ext4_ext_show_leaf(), remove \u0027path\u0027 and use *ppath directly.\r\n\r\nThis issue is triggered only when EXT_DEBUG is defined and therefore does\r\nnot affect functionality.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49889" }, { "cve": "CVE-2024-49890", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/pm: ensure the fw_info is not null before using it\r\n\r\nThis resolves the dereference null return value warning reported by Coverity.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49890" }, { "cve": "CVE-2024-49892", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Initialize get_bytes_per_element\u0027s default to 1\r\n\r\nVariables, used as denominators and maybe not assigned to other values, should not be 0. bytes_per_element_y \u0026 bytes_per_element_c are initialized by get_bytes_per_element() which should never return 0.\r\n\r\nThis fixes 10 DIVIDE_BY_ZERO issues reported by Coverity.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49892" }, { "cve": "CVE-2024-49894", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Fix index out of bounds in degamma hardware format translation\r\n\r\nFixes index out of bounds issue in\r\n`cm_helper_translate_curve_to_degamma_hw_format` function. The issue\r\ncould occur when the index \u0027i\u0027 exceeds the number of transfer function\r\npoints (TRANSFER_FUNC_POINTS).\r\n\r\nThe fix adds a check to ensure \u0027i\u0027 is within bounds before accessing the\r\ntransfer function points. If \u0027i\u0027 is out of bounds the function returns\r\nfalse to indicate an error.\r\n\r\nReported by smatch:\r\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:594 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.red\u0027 1025 \u003c= s32max\r\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:595 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.green\u0027 1025 \u003c= s32max\r\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:596 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.blue\u0027 1025 \u003c= s32max", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49894" }, { "cve": "CVE-2024-49895", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: vulnerability caused by adding a check to ensure the index \u0027i\u0027 is within bounds before accessing transfer function points in cm_helper_translate_curve_to_degamma_hw_format, preventing buffer overflow errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49895" }, { "cve": "CVE-2024-49896", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: vulnerability caused by adding a null check for the stream before dereferencing it in dc_is_stream_unchanged to prevent null pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49896" }, { "cve": "CVE-2024-49900", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: Fix uninit-value access of new_ea in ea_buffer\r\n\r\nsyzbot reports that lzo1x_1_do_compress is using uninit-value:\r\n\r\n=====================================================\r\nBUG: KMSAN: uninit-value in lzo1x_1_do_compress+0x19f9/0x2510 lib/lzo/lzo1x_compress.c:178\r\n\r\n...\r\n\r\nUninit was stored to memory at:\r\n ea_put fs/jfs/xattr.c:639 [inline]\r\n\r\n...\r\n\r\nLocal variable ea_buf created at:\r\n __jfs_setxattr+0x5d/0x1ae0 fs/jfs/xattr.c:662\r\n __jfs_xattr_set+0xe6/0x1f0 fs/jfs/xattr.c:934\r\n\r\n=====================================================\r\n\r\nThe reason is ea_buf-\u003enew_ea is not initialized properly.\r\n\r\nFix this by using memset to empty its content at the beginning\r\nin ea_get().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49900" }, { "cve": "CVE-2024-49901", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/msm/adreno: vulnerability caused by assigning msm_gpu-\u003epdev earlier in the initialization process to prevent null pointer dereferences in msm_gpu_cleanup.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49901" }, { "cve": "CVE-2024-49902", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "jfs: vulnerability caused by assigning msm_gpu-\u003epdev earlier in the initialization process to prevent null pointer dereferences in msm_gpu_cleanup.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49902" }, { "cve": "CVE-2024-49903", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: Fix uaf in dbFreeBits\r\n\r\n[syzbot reported]\r\n==================================================================\r\nBUG: KASAN: slab-use-after-free in __mutex_lock_common kernel/locking/mutex.c:587 [inline]\r\nBUG: KASAN: slab-use-after-free in __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752\r\nRead of size 8 at addr ffff8880229254b0 by task syz-executor357/5216\r\n\r\nCPU: 0 UID: 0 PID: 5216 Comm: syz-executor357 Not tainted 6.11.0-rc3-syzkaller-00156-gd7a5aa4b3c00 #0\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024\r\nCall Trace:\r\n \u003cTASK\u003e\r\n __dump_stack lib/dump_stack.c:93 [inline]\r\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119\r\n print_address_description mm/kasan/report.c:377 [inline]\r\n print_report+0x169/0x550 mm/kasan/report.c:488\r\n kasan_report+0x143/0x180 mm/kasan/report.c:601\r\n __mutex_lock_common kernel/locking/mutex.c:587 [inline]\r\n __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752\r\n dbFreeBits+0x7ea/0xd90 fs/jfs/jfs_dmap.c:2390\r\n dbFreeDmap fs/jfs/jfs_dmap.c:2089 [inline]\r\n dbFree+0x35b/0x680 fs/jfs/jfs_dmap.c:409\r\n dbDiscardAG+0x8a9/0xa20 fs/jfs/jfs_dmap.c:1650\r\n jfs_ioc_trim+0x433/0x670 fs/jfs/jfs_discard.c:100\r\n jfs_ioctl+0x2d0/0x3e0 fs/jfs/ioctl.c:131\r\n vfs_ioctl fs/ioctl.c:51 [inline]\r\n __do_sys_ioctl fs/ioctl.c:907 [inline]\r\n __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\r\n\r\nFreed by task 5218:\r\n kasan_save_stack mm/kasan/common.c:47 [inline]\r\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\r\n kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579\r\n poison_slab_object+0xe0/0x150 mm/kasan/common.c:240\r\n __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256\r\n kasan_slab_free include/linux/kasan.h:184 [inline]\r\n slab_free_hook mm/slub.c:2252 [inline]\r\n slab_free mm/slub.c:4473 [inline]\r\n kfree+0x149/0x360 mm/slub.c:4594\r\n dbUnmount+0x11d/0x190 fs/jfs/jfs_dmap.c:278\r\n jfs_mount_rw+0x4ac/0x6a0 fs/jfs/jfs_mount.c:247\r\n jfs_remount+0x3d1/0x6b0 fs/jfs/super.c:454\r\n reconfigure_super+0x445/0x880 fs/super.c:1083\r\n vfs_cmd_reconfigure fs/fsopen.c:263 [inline]\r\n vfs_fsconfig_locked fs/fsopen.c:292 [inline]\r\n __do_sys_fsconfig fs/fsopen.c:473 [inline]\r\n __se_sys_fsconfig+0xb6e/0xf80 fs/fsopen.c:345\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\n[Analysis]\r\nThere are two paths (dbUnmount and jfs_ioc_trim) that generate race condition when accessing bmap, which leads to the occurrence of uaf.\r\n\r\nUse the lock s_umount to synchronize them, in order to avoid uaf caused by race condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49903" }, { "cve": "CVE-2024-49907", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "drm/amd/display: missing null pointer check before using dc-\u003eclk_mgr.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49907" }, { "cve": "CVE-2024-49913", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "drm/amd/display: missing null check for top_pipe_to_program in commit_planes_for_stream.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49913" }, { "cve": "CVE-2024-49924", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "fbdev: pxafb:use after free in pxafb_task(). In the pxafb_probe function, it calls the pxafb_init_fbinfo function, after which \u0026fbi-\u003etask is associated with pxafb_task. Moreover, within this pxafb_init_fbinfo function, the pxafb_blank function within the \u0026pxafb_ops struct is capable of scheduling work. If we remove the module which will call pxafb_remove to make cleanup, it will call unregister_framebuffer function which can call do_unregister_framebuffer to free fbi-\u003efb through put_fb_info(fb_info), while the work mentioned above will be used.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49924" }, { "cve": "CVE-2024-49930", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "wifi: ath11k: fix array out-of-bound access in SoC stats. Currently, the ath11k_soc_dp_stats::hal_reo_error array is defined with a maximum size of DP_REO_DST_RING_MAX. However, the ath11k_dp_process_rx() function access ath11k_soc_dp_stats::hal_reo_error using the REO destination SRNG ring ID, which is incorrect. SRNG ring ID differ from normal ring ID, and this usage leads to out-of-bounds array access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49930" }, { "cve": "CVE-2024-49933", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "blk_iocost: fix more out of bound shifts.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49933" }, { "cve": "CVE-2024-49936", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "net/xen-netback: prevent UAF in xenvif_flush_hash(). During the list_for_each_entry_rcu iteration call of xenvif_flush_hash, kfree_rcu does not exist inside the rcu read critical section, so if kfree_rcu is called when the rcu grace period ends during the iteration, UAF occurs when accessing head-\u003enext after the entry becomes free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49936" }, { "cve": "CVE-2024-49938", "cwe": { "id": "CWE-824", "name": "Access of Uninitialized Pointer" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit\r\n\r\nSyzbot points out that skb_trim() has a sanity check on the existing length of the skb, which can be uninitialised in some error paths. The intent here is clearly just to reset the length to zero before resubmitting, so switch to calling __skb_set_length(skb, 0) directly. In addition, __skb_set_length() already contains a call to skb_reset_tail_pointer(), so remove the redundant call.\r\n\r\nThe syzbot report came from ath9k_hif_usb_reg_in_cb(), but there\u0027s a similar usage of skb_trim() in ath9k_hif_usb_rx_cb(), change both while we\u0027re at it.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49938" }, { "cve": "CVE-2024-49944", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start. In sctp_listen_start() invoked by sctp_inet_listen(), it should set the sk_state back to CLOSED if sctp_autobind() fails due to whatever reason. Otherwise, next time when calling sctp_inet_listen(), if sctp_sk(sk)-\u003ereuse is already set via setsockopt(SCTP_REUSE_PORT), sctp_sk(sk)-\u003ebind_hash will be dereferenced as sk_state is LISTENING, which causes a crash as bind_hash is NULL", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49944" }, { "cve": "CVE-2024-49948", "cwe": { "id": "CWE-124", "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: add more sanity checks to qdisc_pkt_len_init().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49948" }, { "cve": "CVE-2024-49949", "cwe": { "id": "CWE-124", "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: avoid potential underflow in qdisc_pkt_len_init() with UFO.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49949" }, { "cve": "CVE-2024-49952", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: prevent nf_skb_duplicated corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49952" }, { "cve": "CVE-2024-49955", "cwe": { "id": "CWE-672", "name": "Operation on a Resource after Expiration or Release" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nACPI: battery: Fix possible crash when unregistering a battery hook\r\n\r\nWhen a battery hook returns an error when adding a new battery, then the battery hook is automatically unregistered.\r\nHowever the battery hook provider cannot know that, so it will later call battery_hook_unregister() on the already unregistered battery hook, resulting in a crash.\r\n\r\nFix this by using the list head to mark already unregistered battery hooks as already being unregistered so that they can be ignored by battery_hook_unregister().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49955" }, { "cve": "CVE-2024-49957", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: null-ptr-deref when journal load failed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49957" }, { "cve": "CVE-2024-49958", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: reserve space for inline xattr before attaching reflink tree.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49958" }, { "cve": "CVE-2024-49959", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error In __jbd2_log_wait_for_space(), we might call jbd2_cleanup_journal_tail() to recover some journal space.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49959" }, { "cve": "CVE-2024-49962", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49962" }, { "cve": "CVE-2024-49963", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mailbox: bcm2835: timeout during suspend mode.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49963" }, { "cve": "CVE-2024-49965", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: remove unreasonable unlock in ocfs2_read_blocks Patch series \"Misc fixes for ocfs2_read_blocks\", v5.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49965" }, { "cve": "CVE-2024-49966", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: cancel dqi_sync_work before freeing oinfo ocfs2_global_read_info() will initialize and schedule dqi_sync_work at the end.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49966" }, { "cve": "CVE-2024-49967", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ext4: no need to continue when the number of entries is 1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49967" }, { "cve": "CVE-2024-49969", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: index out of bounds in DCN30 color transformation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49969" }, { "cve": "CVE-2024-49971", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: dml2_core_shared_mode_support and dml_core_mode_support access the third element of dummy_boolean, for example: hw_debug5 = \u0026s-\u003edummy_boolean. Any assignment to hw_debug5 would cause an OVERRUN.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49971" }, { "cve": "CVE-2024-49973", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "r8169: RTL8125 added fields to the tally counter, this change could cause the chip to perform Direct Memory Access on these new fields, potentially writing to unallocated memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49973" }, { "cve": "CVE-2024-49975", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "uprobes: vma xol_add_vma() maps the uninitialized page allocated by __create_xol_area() into userspace. On some architectures (x86) this memory is readable even without VM_READ permission. Additionally setting VM_EXEC produces the same page protection attributes (pgprot_t) as setting both VM_EXEC and VM_READ. Nevertheless, the debugger can read this memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49975" }, { "cve": "CVE-2024-49977", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: stmmac: port_transmit_rate_kbps could be set to a value of 0, which is then passed to the \"div_s64\" function when tc-cbs is disabled. This leads to a zero-division error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49977" }, { "cve": "CVE-2024-49981", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: venus: A race condition may trigger a use after free vulnerability in venus_remove.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49981" }, { "cve": "CVE-2024-49982", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in more places For fixing CVE-2023-6270, f98364e92662 (\"aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts\") makes tx() calling dev_put() instead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs into use-after-free. Then Nicolai Stange found more places in aoe have potential use-after-free problem with tx(). e.g. revalidate(), aoecmd_ata_rw(), resend(), probe() and aoecmd_cfg_rsp(). Those functions also use aoenet_xmit() to push packet to tx queue. So they should also use dev_hold() to increase the refcnt of skb-\u003edev. On the other hand, moving dev_put() to tx() causes that the refcnt of skb-\u003edev be reduced to a negative value, because corresponding dev_hold() are not called in revalidate(), aoecmd_ata_rw(), resend(), probe(), and aoecmd_cfg_rsp(). This patch fixed this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49982" }, { "cve": "CVE-2024-49983", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ext4: When calling ext4_force_split_extent_at() in ext4_ext_replay_update_ex(), the \u0027ppath\u0027 is updated but it is the \u0027path\u0027 that is freed, thus potentially triggering a double-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49983" }, { "cve": "CVE-2024-49985", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "i2c: stm32f7: In case there is any sort of clock controller attached to the I2C bus controller, for example Versaclock or even an AIC32x4 I2C codec, then an I2C transfer triggered from the clock controller clk_ops .prepare callback may trigger a deadlock on drivers/clk/clk.c prepare_lock mutex.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49985" }, { "cve": "CVE-2024-49993", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "iommu/vt-d: vulnerability may cause a soft lockup if qi_submit_sync() is called with zero invalidation descriptors, as the completion of invalidation_wait may not be detected, leading to an indefinite wait.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49993" }, { "cve": "CVE-2024-49995", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tipc: vulnerability due to a potential buffer overrun when copying media_name and if_name to name_parts, which may be prevented by using strscpy() to avoid overwriting the destination buffer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49995" }, { "cve": "CVE-2024-49997", "cwe": { "id": "CWE-226", "name": "Sensitive Information in Resource Not Removed Before Reuse" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix memory disclosure When applying padding, the buffer is not zeroed, which results in memory disclosure. The mentioned data is observed on the wire. This patch uses skb_put_padto() to pad Ethernet frames properly. The mentioned function zeroes the expanded buffer. In case the packet cannot be padded it is silently dropped. Statistics are also not incremented. This driver does not support statistics in the old 32-bit format or the new 64-bit format. These will be added in the future. In its current form, the patch should be easily backported to stable versions. Ethernet MACs on Amazon-SE and Danube cannot do padding of the packets in hardware, so software padding must be applied.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49997" }, { "cve": "CVE-2024-50001", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/mlx5: Fix error path in multi-packet WQE transmit\r\n\r\nRemove the erroneous unmap in case no DMA mapping was established\r\n\r\nThe multi-packet WQE transmit code attempts to obtain a DMA mapping for the skb. This could fail, e.g. under memory pressure, when the IOMMU driver just can\u0027t allocate more memory for page tables. While the code tries to handle this in the path below the err_unmap label it erroneously unmaps one entry from the sq\u0027s FIFO list of active mappings. Since the current map attempt failed this unmap is removing some random DMA mapping that might still be required. If the PCI function now presents that IOVA, the IOMMU may assumes a rogue DMA access and e.g. on s390 puts the PCI function in error state.\r\n\r\nThe erroneous behavior was seen in a stress-test environment that created memory pressure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50001" }, { "cve": "CVE-2024-50006", "cwe": { "id": "CWE-833", "name": "Deadlock" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix i_data_sem unlock order in ext4_ind_migrate().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50006" }, { "cve": "CVE-2024-50007", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: asihpi: potential OOB array access ASIHPI driver stores some values in the static array upon a response from the driver, and its index depends on the firmware.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50007" }, { "cve": "CVE-2024-50008", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "wifi: mwifiex: memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() Replace one-element array with a flexible-array member in `struct host_cmd_ds_802_11_scan_ext`.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50008" }, { "cve": "CVE-2024-50013", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "exfat: memory leak in exfat_load_bitmap() If the first directory entry in the root directory is not a bitmap directory entry, \u0027bh\u0027 will not be released and reassigned, which will cause a memory leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50013" }, { "cve": "CVE-2024-50015", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "ext4: dax: Overflowing extents beyond inode size when partially writing.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50015" }, { "cve": "CVE-2024-50024", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: unsafe loop on the list.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50024" }, { "cve": "CVE-2024-50033", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nslip: make slhc_remember() more robust against malicious packets\r\n\r\nsyzbot found that slhc_remember() was missing checks against\r\nmalicious packets [1].\r\n\r\nslhc_remember() only checked the size of the packet was at least 20,\r\nwhich is not good enough.\r\n\r\nWe need to make sure the packet includes the IPv4 and TCP header\r\nthat are supposed to be carried.\r\n\r\nAdd iph and th pointers to make the code more readable.\r\n\r\n[1]\r\n\r\nBUG: KMSAN: uninit-value in slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666\r\n slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666\r\n ppp_receive_nonmp_frame+0xe45/0x35e0 drivers/net/ppp/ppp_generic.c:2455\r\n ppp_receive_frame drivers/net/ppp/ppp_generic.c:2372 [inline]\r\n ppp_do_recv+0x65f/0x40d0 drivers/net/ppp/ppp_generic.c:2212\r\n ppp_input+0x7dc/0xe60 drivers/net/ppp/ppp_generic.c:2327\r\n pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379\r\n sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113\r\n __release_sock+0x1da/0x330 net/core/sock.c:3072\r\n release_sock+0x6b/0x250 net/core/sock.c:3626\r\n pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nUninit was created at:\r\n slab_post_alloc_hook mm/slub.c:4091 [inline]\r\n slab_alloc_node mm/slub.c:4134 [inline]\r\n kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4186\r\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587\r\n __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678\r\n alloc_skb include/linux/skbuff.h:1322 [inline]\r\n sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732\r\n pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nCPU: 0 UID: 0 PID: 5460 Comm: syz.2.33 Not tainted 6.12.0-rc2-syzkaller-00006-g87d6aab2389e #0\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50033" }, { "cve": "CVE-2024-50035", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nppp: fix ppp_async_encode() illegal access\r\n\r\nsyzbot reported an issue in ppp_async_encode() [1]\r\n\r\nIn this case, pppoe_sendmsg() is called with a zero size.\r\nThen ppp_async_encode() is called with an empty skb.\r\n\r\nBUG: KMSAN: uninit-value in ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]\r\n BUG: KMSAN: uninit-value in ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675\r\n ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]\r\n ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675\r\n ppp_async_send+0x130/0x1b0 drivers/net/ppp/ppp_async.c:634\r\n ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2280 [inline]\r\n ppp_input+0x1f1/0xe60 drivers/net/ppp/ppp_generic.c:2304\r\n pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379\r\n sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113\r\n __release_sock+0x1da/0x330 net/core/sock.c:3072\r\n release_sock+0x6b/0x250 net/core/sock.c:3626\r\n pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nUninit was created at:\r\n slab_post_alloc_hook mm/slub.c:4092 [inline]\r\n slab_alloc_node mm/slub.c:4135 [inline]\r\n kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4187\r\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587\r\n __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678\r\n alloc_skb include/linux/skbuff.h:1322 [inline]\r\n sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732\r\n pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nCPU: 1 UID: 0 PID: 5411 Comm: syz.1.14 Not tainted 6.12.0-rc1-syzkaller-00165-g360c1f1f24c6 #0\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50035" }, { "cve": "CVE-2024-50039", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/sched: accept TCA_STAB only for root qdisc\r\n\r\nMost qdiscs maintain their backlog using qdisc_pkt_len(skb) on the assumption it is invariant between the enqueue() and dequeue() handlers.\r\n\r\nUnfortunately syzbot can crash a host rather easily using a TBF + SFQ combination, with an STAB on SFQ [1]\r\n\r\nWe can\u0027t support TCA_STAB on arbitrary level, this would require to maintain per-qdisc storage.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50039" }, { "cve": "CVE-2024-50040", "cwe": { "id": "CWE-390", "name": "Detection of Error Condition Without Action" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: igb: Do not bring the device up after non-fatal error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50040" }, { "cve": "CVE-2024-50044", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nBluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change\r\n\r\nrfcomm_sk_state_change attempts to use sock_lock so it must never be called with it locked but rfcomm_sock_ioctl always attempt to lock it.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50044" }, { "cve": "CVE-2024-50045", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: br_netfilter: fix panic with metadata_dst skb.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50045" }, { "cve": "CVE-2024-50046", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nNFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies()\r\n\r\nOn the node of an NFS client, some files saved in the mountpoint of the NFS server were copied to another location of the same NFS server.\r\nAccidentally, the nfs42_complete_copies() got a NULL-pointer dereference crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50046" }, { "cve": "CVE-2024-50049", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: null pointer before dereferencing se.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50049" }, { "cve": "CVE-2024-50051", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "spi: mpc52xx: Add cancel_work_sync before module remove. If the module which will call mpc52xx_spi_remove is removed, it will free \u0027ms\u0027 through spi_unregister_controller. while the work ms-\u003ework will be used. The sequence of operations that may lead to a UAF bug.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50051" }, { "cve": "CVE-2024-50059", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ntb: ntb_hw_switchtec: use after free vulnerability in switchtec_ntb_remove due to race condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50059" }, { "cve": "CVE-2024-50074", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "parport: The recent fix for array out-of-bounds accesses replaced sprintf() calls blindly with snprintf(). However, since snprintf() returns the would-be-printed size, not the actually output size, the length calculation can still go over the given limit.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50074" }, { "cve": "CVE-2024-50082", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "blk-rq-qos: vulnerability in blk-rq-qos can cause a crash due to a race condition between rq_qos_wait and rq_qos_wake_function, which is fixed by ensuring the waitqueue entry is accessed in the correct order.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50082" }, { "cve": "CVE-2024-50083", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tcp: vulnerability in may cause DSS corruption due to large PMTU transmissions, which is fixed by addressing the issue in the __mptcp_move_skbs_from_subflow function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50083" }, { "cve": "CVE-2024-50089", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "unicode: problematic ignorable code points.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50089" }, { "cve": "CVE-2024-50095", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nRDMA/mad: Improve handling of timed out WRs of mad agent\r\n\r\nCurrent timeout handler of mad agent acquires/releases mad_agent_priv lock for every timed out WRs. This causes heavy locking contention when higher no. of WRs are to be handled inside timeout handler.\r\n\r\nThis leads to softlockup with below trace in some use cases where rdma-cm path is used to establish connection between peer nodes\r\n\r\n\r\nSimplified timeout handler by creating local list of timed out WRs and invoke send handler post creating the list. The new method acquires/releases lock once to fetch the list and hence helps to reduce locking contetiong when processing higher no. of WRs", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50095" }, { "cve": "CVE-2024-50096", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nouveau/dmem: vulnerability in migrate_to_ram upon copy error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50096" }, { "cve": "CVE-2024-50099", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "arm64: probes: Broken LDR (literal) uprobe support.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50099" }, { "cve": "CVE-2024-50179", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ceph: incorrect Fw reference check when dirtying pages.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50179" }, { "cve": "CVE-2024-50180", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "fbdev: sisfb: Fix strbuf array overflow. The values of the variables xres and yres are placed in strbuf. These variables are obtained from strbuf1. The strbuf1 array contains digit characters and a space if the array contains non-digit characters. Then, when executing sprintf(strbuf, \"%ux%ux8\", xres, yres); more than 16 bytes will be written to strbuf.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50180" }, { "cve": "CVE-2024-50181", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D. For i.MX7D DRAM related mux clock, the clock source change should ONLY be done done in low level asm code without accessing DRAM, and then calling clk API to sync the HW clock status with clk tree, it should never touch real clock source switch via clk API, so CLK_SET_PARENT_GATE flag should NOT be added, otherwise, DRAM\u0027s clock parent will be disabled when DRAM is active, and system will hang.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50181" }, { "cve": "CVE-2024-50184", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "virtio_pmem: Check device status before requesting flush. If a pmem device is in a bad status, the driver side could wait for host ack forever in virtio_pmem_flush(), causing the system to hang.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50184" }, { "cve": "CVE-2024-50185", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "linux: mptcp: handle consistently DSS corruption. Bugged peer implementation can send corrupted DSS options, consistently hitting a few warning in the data path.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50185" }, { "cve": "CVE-2024-50188", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "net: phy: dp83869: fix memory corruption when enabling fiber. When configuring the fiber port, the DP83869 PHY driver incorrectly calls linkmode_set_bit() with a bit mask (1 \u0026lt;\u0026lt; 10) rather than a bit number (10). This corrupts some other memory location -- in case of arm64 the priv pointer in the same structure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50188" }, { "cve": "CVE-2024-50193", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "x86/entry_32: Clear CPU buffers after register restore in NMI return CPU buffers are currently cleared after call to exc_nmi, but before register state is restored. This may be okay for MDS mitigation but not for RDFS. Because RDFS mitigation requires CPU buffers to be cleared when registers don\u0027t have any sensitive data. Move CLEAR_CPU_BUFFERS after RESTORE_ALL_NMI.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50193" }, { "cve": "CVE-2024-50194", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "arm64: probes: Fix uprobes for big-endian kernels The arm64 uprobes code is broken for big-endian kernels as it doesn\u0027t convert the in-memory instruction encoding (which is always little-endian) into the kernel\u0027s native endianness before analyzing and simulating instructions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50194" }, { "cve": "CVE-2024-50195", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "posix-clock: Fix missing timespec64 check in pc_clock_settime().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50195" }, { "cve": "CVE-2024-50198", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "iio: light: veml6030: fix IIO device retrieval from embedded device. The dev pointer that is received as an argument in the in_illuminance_period_available_show function references the device embedded in the IIO device, not in the i2c client. dev_to_iio_dev() must be used to accessthe right data. The current implementation leads to a segmentation fault on every attempt to read the attribute because indio_dev gets a NULL assignment.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50198" }, { "cve": "CVE-2024-50199", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mm/swapfile: skip HugeTLB pages for unuse_vma I got a bad pud error and lost a 1GB HugeTLB when calling swapoff.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50199" }, { "cve": "CVE-2024-50201", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "linux: drm/radeon: encoder-\u003epossible_clones. In the past nothing validated that drivers were populating possible_clones correctly, which resulted in some warnings during driver initialization.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50201" }, { "cve": "CVE-2024-50202", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: propagate directory read errors from nilfs_find_entry(). A task hang occurs in vcs_open() during a fuzzing test for nilfs2. The root cause of this problem is that in nilfs_find_entry(), which searches for directory entries, ignores errors when loading a directory page/folio via nilfs_get_folio() fails. If the filesystem images is corrupted, and the i_size of the directory inode is large, and the directory page/folio is successfully read but fails the sanity check.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50202" }, { "cve": "CVE-2024-50218", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50218" }, { "cve": "CVE-2024-50234", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "summary", "text": "wifi: iwlegacy: vulnerability due to stale interrupts not being cleared before resuming the iwl4965 device from hibernation, causing a race condition between the resume process and restart work.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50234" }, { "cve": "CVE-2024-50236", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: ath10k: Fix memory leak in management tx In the current logic, memory is allocated for storing the MSDU context during management packet TX but this memory is not being freed during management TX completion. Similar leaks are seen in the management TX cleanup logic.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50236" }, { "cve": "CVE-2024-50237", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower Avoid potentially crashing in the driver because of uninitialized private data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50237" }, { "cve": "CVE-2024-50251", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() If access to offset + length is larger than the skbuff length, then skb_checksum() triggers BUG_ON(). skb_checksum() internally subtracts the length parameter while iterating over skbuff, BUG_ON(len) at the end of it checks that the expected length to be included in the checksum calculation is fully consumed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50251" }, { "cve": "CVE-2024-50262", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds write in trie_get_next_key().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50262" }, { "cve": "CVE-2024-50264", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "vsock/virtio: Initialization of the dangling pointer occurring in vsk-\u003etrans. During loopback communication, a dangling pointer can be created in vsk-\u003etrans, potentially leading to a Use-After-Free condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50264" }, { "cve": "CVE-2024-50265", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() Syzkaller is able to provoke null-ptr-dereference in ocfs2_xa_remove().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50265" }, { "cve": "CVE-2024-50267", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "USB: serial: io_edgeport: fix use after free in debug printk The \"dev_dbg(\u0026urb-\u003edev-\u003edev, ...\" which happens after usb_free_urb(urb) is a use after free of the \"urb\" pointer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50267" }, { "cve": "CVE-2024-50268", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd(). The \"*cmd\" variable can be controlled by the user via debugfs. That means \"new_cam\" can be as high as 255 while the size of the uc-\u003eupdated[] array is UCSI_MAX_ALTMODES (30). The call tree is: ucsi_cmd() // val comes from simple_attr_write_xsigned() -\u003e ucsi_send_command() -\u003e ucsi_send_command_common() -\u003e ucsi_run_command() // calls ucsi-\u003eops-\u003esync_control() -\u003e ucsi_ccg_sync_control().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50268" }, { "cve": "CVE-2024-50269", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "usb: musb: sunxi: accessing an released usb phy will cause that usb phy @glue-\u003exceiv is accessed after released.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50269" }, { "cve": "CVE-2024-50273", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "btrfs: reinitialize delayed ref list after deleting it from the list. At insert_delayed_ref() if there is a need to update the action of an existing ref to BTRFS_DROP_DELAYED_REF, the ref from its ref head\u0027s ref_add_list is deleted using list_del(), which leaves the ref\u0027s add_list member not reinitialized, as list_del() sets the next and prev members of the list to LIST_POISON1 and LIST_POISON2, respectively.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50273" }, { "cve": "CVE-2024-50278", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "dm cache: potential out-of-bounds access on the first resume Out-of-bounds access occurs if the fast device is expanded unexpectedly before the first-time resume of the cache table.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50278" }, { "cve": "CVE-2024-50279", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "dm cache: out-of-bounds access to the dirty bitset when resizing dm-cache checks the dirty bits of the cache blocks to be dropped when shrinking the fast device, but an index bug in bitset iteration causes out-of-bounds access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50279" }, { "cve": "CVE-2024-50282", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() Avoid a possible buffer overflow if size is larger than 4K.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50282" }, { "cve": "CVE-2024-50287", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: v4l2-tpg: prevent the risk of a division by zero As reported by Coverity, the logic at tpg_precalculate_line() blindly rescales the buffer even when scaled_witdh is equal to zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50287" }, { "cve": "CVE-2024-50290", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: cx24116: prevent overflows on SNR calculus as reported by Coverity, if reading SNR registers fail, a negative number will be returned, causing an underflow when reading SNR registers. Prevent that.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50290" }, { "cve": "CVE-2024-50292", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ASoC: stm32: spdifrx: dma channel release in stm32_spdifrx_remove In case of error when requesting ctrl_chan DMA channel, ctrl_chan is not null.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50292" }, { "cve": "CVE-2024-50295", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: arc: A warning is shown because ndev-\u003edev and pdev-\u003edev are not the same device.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50295" }, { "cve": "CVE-2024-50296", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hns3: A kernel crash may occur when the driver is uninstalled and the VF is disabled concurrently.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50296" }, { "cve": "CVE-2024-50299", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50299" }, { "cve": "CVE-2024-50301", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: security/keys: fix slab-out-of-bounds in key_task_permission.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50301" }, { "cve": "CVE-2024-50302", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let\u0027s zero-initialize it during allocation to make sure that it can\u0027t be ever used to leak kernel memory via specially-crafted report.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50302" }, { "cve": "CVE-2024-50304", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ipv4: ip_tunnel: Suspicious RCU usage warning in ip_tunnel_find().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50304" }, { "cve": "CVE-2024-50602", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50602" }, { "cve": "CVE-2024-52332", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "igb: Fix potential invalid memory access in igb_init_module() The pci_register_driver() can fail and when this happened, the dca_notifier needs to be unregistered, otherwise the dca_notifier can be called when igb fails to install, resulting to invalid memory access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-52332" }, { "cve": "CVE-2024-53052", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "io_uring/rw: vulnerability due to io_uring not checking for IOCB_NOWAIT when starting an O_DIRECT write, leading to potential deadlocks if the mount point is being frozen.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53052" }, { "cve": "CVE-2024-53057", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53057" }, { "cve": "CVE-2024-53059", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()\r\n\r\n1. The size of the response packet is not validated.\r\n2. The response buffer is not freed.\r\n\r\nResolve these issues by switching to iwl_mvm_send_cmd_status(), which handles both size validation and frees the buffer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53059" }, { "cve": "CVE-2024-53060", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability due to a potential NULL pointer dereference in drm/amdgpu if acpi_evaluate_object() returns AE_NOT_FOUND, which is mitigated by bailing out when this status is encountered.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53060" }, { "cve": "CVE-2024-53061", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "media: s5p-jpeg: vulnerability due to the possibility of buffer overflows when the variable word is less than 2, which is prevented by adding extra checks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53061" }, { "cve": "CVE-2024-53063", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: dvbdev: risk of out of memory access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53063" }, { "cve": "CVE-2024-53066", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfs: KMSAN warning in decode_getfattr_attrs().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53066" }, { "cve": "CVE-2024-53097", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mm: krealloc: MTE false alarm in __do_krealloc.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53097" }, { "cve": "CVE-2024-53101", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: fs: Fix uninitialized value issue in from_kuid and from_kgid ocfs2_setattr() uses attr-\u003eia_mode, attr-\u003eia_uid and attr-\u003eia_gid in a trace point even though ATTR_MODE, ATTR_UID and ATTR_GID aren\u0027t set. Initialize all fields of newattrs to avoid uninitialized variables, by checking if ATTR_MODE, ATTR_UID, ATTR_GID are initialized, otherwise 0.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53101" }, { "cve": "CVE-2024-53103", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hv_sock: Initializing vsk-\u003etrans to NULL to prevent a dangling pointer When hvs is released, there is a possibility that vsk-\u003etrans may not be initialized to NULL, which could lead to a dangling pointer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53103" }, { "cve": "CVE-2024-53104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53104" }, { "cve": "CVE-2024-53145", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "um: potential integer overflow during physmem setup. This vulnerability happens when the real map size is greater than LONG_MAX, which can be easily triggered on UML/i386.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53145" }, { "cve": "CVE-2024-53146", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NFSD: Prevent a potential integer overflow If the tag length is \u003e= U32_MAX - 3 then the \"length + 4\" addition can result in an integer overflow. Address this by splitting the decoding into several steps so that decode_cb_compound4res() does not have to perform arithmetic on the unsafe length value.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53146" }, { "cve": "CVE-2024-53148", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "comedi: Flush partial mappings in error case If some remap_pfn_range() calls succeeded before one failed, we still have buffer pages mapped into the userspace page tables when we drop the buffer reference with comedi_buf_map_put(bm). The userspace mappings are only cleaned up later in the mmap error path.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53148" }, { "cve": "CVE-2024-53150", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "ALSA: usb-audio: out of bounds reads when finding clock sources The current USB-audio driver code doesn\u0027t check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal. When the descriptor length is shorter than expected, it\u0027s skipped in the loop. For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:H/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53150" }, { "cve": "CVE-2024-53155", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: uninitialized value in ocfs2_file_read_iter().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53155" }, { "cve": "CVE-2024-53156", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53156" }, { "cve": "CVE-2024-53157", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "firmware: arm_scpi: Check the DVFS OPP count returned by the firmware Fix a kernel crash with the below call trace when the SCPI firmware returns OPP count of zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53157" }, { "cve": "CVE-2024-53158", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "soc: qcom: geni-se: array underflow in geni_se_clk_tbl_get() This loop is supposed to break if the frequency returned from clk_round_rate() is the same as on the previous iteration. However, that check doesn\u0027t make sense on the first iteration through the loop. It leads to reading before the start of these-\u003eclk_perf_tbl[] array.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53158" }, { "cve": "CVE-2024-53161", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "EDAC/bluefield: potential integer overflow The 64-bit argument for the \"get DIMM info\" SMC call consists of mem_ctrl_idx left-shifted 16 bits and OR-ed with DIMM index. With mem_ctrl_idx defined as 32-bits wide the left-shift operation truncates the upper 16 bits of information during the calculation of the SMC argument. The mem_ctrl_idx stack variable must be defined as 64-bits wide to prevent any potential integer overflow, i.e. loss of data from upper 16 bits.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53161" }, { "cve": "CVE-2024-53165", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let\u0027s only add it to the list after everything has succeeded.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53165" }, { "cve": "CVE-2024-53171", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ubifs: authentication: After an insertion in TNC, the tree might split and cause a node to change its `znode-\u003eparent`. A further deletion of other nodes in the tree (which also could free the nodes), the aforementioned node\u0027s `znode-\u003ecparent` could still point to a freed node. This `znode-\u003ecparent` may not be updated when getting nodes to commit in `ubifs_tnc_start_commit()`. This could then trigger a use-after-free when accessing the `znode-\u003ecparent` in `write_index()` in `ubifs_tnc_end_commit()`.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53171" }, { "cve": "CVE-2024-53172", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ubi: fastmap: The duplicate slab cache names can be detected and a kernel WARNING is thrown out.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53172" }, { "cve": "CVE-2024-53173", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NFSv4.0: When two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53173" }, { "cve": "CVE-2024-53174", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SUNRPC: The function `c_show` was called with protection from RCU. This only ensures that `cp` will not be freed. Therefore, the reference count for `cp` can drop to zero, which will trigger a refcount use-after-free warning when `cache_get` is called.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53174" }, { "cve": "CVE-2024-53181", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "um: vector: The drvdata is not available in release", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53181" }, { "cve": "CVE-2024-53183", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "um: net: The drvdata is not available in release.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53183" }, { "cve": "CVE-2024-53184", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "um: ubd: The drvdata is not available in release.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53184" }, { "cve": "CVE-2024-53194", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "PCI: vulnerability causes a use-after-free error during hot removal of a USB4 dock due to improper handling of pci_slot and pci_bus references, which is fixed by ensuring pci_slot acquires a reference to pci_bus.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53194" }, { "cve": "CVE-2024-53197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: usb-audio: vulnerability leading to out-of-bound accesses due to a bogus device providing an excessive bNumConfigurations value, which is fixed by ensuring proper allocation in usb_get_configuration.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53197" }, { "cve": "CVE-2024-53198", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "xen: issue of resource not being properly released in xenbus_dev_probe().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53198" }, { "cve": "CVE-2024-53214", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "vfio/pci: out-of-bounds access to ecap_perms array.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53214" }, { "cve": "CVE-2024-53217", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: NFSD: Prevent NULL dereference in nfsd4_process_cb_update().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53217" }, { "cve": "CVE-2024-53226", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "RDMA/hns: vulnerability due to a potential NULL pointer dereference in hns_roce_map_mr_sg() because ib_map_mr_sg() allows upper layer protocols (ULPs) to specify NULL as the sg_offset argument, requiring the driver to check for NULL before dereferencing.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53226" }, { "cve": "CVE-2024-53227", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: bfa: use-after-free in bfad_im_module_exit().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53227" }, { "cve": "CVE-2024-53237", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Bluetooth: vulnerability due to an use-after-free error in the device_for_each_child function, where a device may be accessed after it has been freed, potentially leading to a dangling pointer and system instability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53237" }, { "cve": "CVE-2024-53239", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: 6fire: The current 6fire code tries to release the resources right after the call of usb6fire_chip_abort(). But at this moment, the card object might be still in use (as we\u0027re calling snd_card_free_when_closed()) and cause potential UAFs.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53239" }, { "cve": "CVE-2024-53240", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "xen/netfront: vulnerability causes a crash when removing a device after a suspend/resume cycle due to uninitialized queues, which is fixed by checking for the existence of queues before attempting to stop them.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53240" }, { "cve": "CVE-2024-53241", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "x86/xen: vulnerability due to issues with the PV iret hypercall through the hypercall page, which is fixed by directly coding the sequence in xen-asm.S to avoid problems with speculation mitigations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53241" }, { "cve": "CVE-2024-53680", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ipvs: vulnerability causes undefined behavior due to uninitialized stack access in ip_vs_protocol_init(), which is fixed by zeroing the on-stack buffer to prevent out-of-bound accesses.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53680" }, { "cve": "CVE-2024-56531", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: caiaq: OTOH, the current code uses snd_card_free() at disconnection, but this waits for the close of all used fds, hence it can take long. It eventually blocks the upper layer USB ioctls, which may trigger a soft lockup.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56531" }, { "cve": "CVE-2024-56532", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: us122l: OTOH, the current code uses snd_card_free() at disconnection, but this waits for the close of all used fds, hence it can take long. It eventually blocks the upper layer USB ioctls, which may trigger a soft lockup.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56532" }, { "cve": "CVE-2024-56533", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: usx2y: The USB disconnect callback takes longer than it should. The current code uses snd_card_free() at disconnection, but this waits for the close of all used fds, hence it can take long. It eventually blocks the upper layer USB ioctls, which may trigger a soft lockup.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56533" }, { "cve": "CVE-2024-56539", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56539" }, { "cve": "CVE-2024-56548", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hfsplus: Devices block sizes may change. One of these cases is a loop device by using ioctl LOOP_SET_BLOCK_SIZE. While this may cause other issues like IO being rejected, in the case of hfsplus, it will allocate a block by using that size and potentially write out-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the latter function reads a different io_size.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56548" }, { "cve": "CVE-2024-56558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfsd: make sure exp active before svc_export_show The function `e_show` was called with protection from RCU. This only ensures that `exp` will not be freed. Therefore, the reference count for `exp` can drop to zero, which will trigger a refcount use-after-free warning when `exp_get` is called.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56558" }, { "cve": "CVE-2024-56562", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "i3c: master: miss free init_dyn_addr at i3c_master_put_i3c_addrs().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56562" }, { "cve": "CVE-2024-56567", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "ad7780: division by zero in ad7780_write_raw() In the ad7780_write_raw() , val2 can be zero, which might lead to a division by zero error in DIV_ROUND_CLOSEST(). The ad7780_write_raw() is based on iio_info\u0027s write_raw. While val is explicitly declared that can be zero (in read mode), val2 is not specified to be non-zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56567" }, { "cve": "CVE-2024-56568", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "iommu/arm-smmu: Defer probe of clients after smmu device bound Null pointer dereference occurs due to a race between smmu driver probe and client driver probe, when of_dma_configure() for client is called after the iommu_device_register() for smmu driver probe has executed but before the driver_bound() for smmu driver has been called.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56568" }, { "cve": "CVE-2024-56569", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ftrace: Fix regression with module command in stack_trace_filter When executing the following command: # echo \"write*:mod:ext3\" \u003e /sys/kernel/tracing/stack_trace_filter The current mod command causes a null pointer dereference. While commit 0f17976568b3f (\"ftrace: Fix regression with module command in stack_trace_filter\") has addressed part of the issue, it left a corner case unhandled, which still results in a kernel crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56569" }, { "cve": "CVE-2024-56570", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ovl: Filter invalid inodes with missing lookup function Add a check to the ovl_dentry_weird() function to prevent the processing of directory inodes that lack the lookup function.This is important because such inodes can cause errors in overlayfs when passed to the lowerstack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56570" }, { "cve": "CVE-2024-56571", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: uvcvideo: Require entities to have a non-zero unique ID.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56571" }, { "cve": "CVE-2024-56572", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "media: platform: allegro-dvt: possible memory leak in allocate_buffers_internal(). If The buffer in the loop is not released under the exception path, it may lead to a memory leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56572" }, { "cve": "CVE-2024-56574", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: ts2020: null-ptr-deref in ts2020_probe().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56574" }, { "cve": "CVE-2024-56576", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: i2c: tc358743: crash in the probe error path when using polling. If an error occurs in the probe() function, the polling timer that was alarmed earlier should be removed, otherwise the timer is called with arguments that are already freed, which results in a crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56576" }, { "cve": "CVE-2024-56581", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "btrfs: ref-verify: use-after-free after invalid ref action.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56581" }, { "cve": "CVE-2024-56586", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "f2fs: fix f2fs_bug_on when uninstalling filesystem call f2fs_evict_inode. creating a large files during checkpoint disable until it runs out of space and then delete it, then remount to enable checkpoint again, and then unmount the filesystem triggers the f2fs_bug_on.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56586" }, { "cve": "CVE-2024-56587", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "leds: class: Protect brightness_show() with led_cdev-\u003eled_access mutex. There is NULL pointer vulnerability observed if from Process A where hid device being added which results in adding a led_cdev addition and later a another call to access of led_cdev attribute from Process B can result in NULL pointer vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56587" }, { "cve": "CVE-2024-56589", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: hisi_sas: Add cond_resched() for no forced preemption model. For no forced preemption model kernel, in the scenario where the expander is connected to 12 high performance SAS SSDs, a call trace may occur.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56589" }, { "cve": "CVE-2024-56593", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw(). This patch fixes a NULL pointer dereference bug in brcmfmac that occurs when a high \u0027sd_sgentry_align\u0027 value applies (e.g. 512) and a lot of queued SKBs are sent from the pkt queue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56593" }, { "cve": "CVE-2024-56594", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: set the right AMDGPU sg segment limitation. The driver needs to set the correct max_segment_size; otherwise debug_dma_map_sg() will complain about the over-mapping of the AMDGPU sg length.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56594" }, { "cve": "CVE-2024-56595", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree. When the value of lp is 0 at the beginning of the for loop, it will become negative in the next assignment and we should bail out.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56595" }, { "cve": "CVE-2024-56596", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jfs: array-index-out-of-bounds in jfs_readdir. The stbl might contain some invalid values. Added a check to return error code in that case.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56596" }, { "cve": "CVE-2024-56597", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jfs: fix shift-out-of-bounds in dbSplit. When dmt_budmin is less than zero, it causes errors in the later stages. Added a check to return an error beforehand in dbAllocCtl itself.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56597" }, { "cve": "CVE-2024-56598", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jfs: array-index-out-of-bounds fix in dtReadFirst. The value of stbl can be sometimes out of bounds due to a bad filesystem. Added a check with appopriate return of error code in that case.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56598" }, { "cve": "CVE-2024-56600", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56600" }, { "cve": "CVE-2024-56601", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create() sock_init_data() attaches the allocated sk object to the provided sock object. If inet_create() fails later, the sk object is freed, but the sock object retains the dangling pointer, which may create use-after-free later. Clear the sk pointer in the sock object on error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56601" }, { "cve": "CVE-2024-56602", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "net: ieee802154: do not leave a dangling sk pointer in ieee802154_create(). sock_init_data() attaches the allocated sk object to the provided sock object. If ieee802154_create() fails later, the allocated sk object is freed, but the dangling pointer remains in the provided sock object, which may allow use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56602" }, { "cve": "CVE-2024-56603", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: af_can: do not leave a dangling sk pointer in can_create(). On error can_create() frees the allocated sk object, but sock_init_data() has already attached it to the provided sock object. This will leave a dangling sk pointer in the sock object and may cause use-after-free later.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56603" }, { "cve": "CVE-2024-56605", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() bt_sock_alloc() allocates the sk object and attaches it to the provided sock object. On error l2cap_sock_alloc() frees the sk object, but the dangling pointer is still attached to the sock object, which may create use-after-free in other code.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56605" }, { "cve": "CVE-2024-56606", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object. On error, packet_create() frees the sk object leaving the dangling pointer in the sock object on return. Some other code may try to use this pointer and cause use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56606" }, { "cve": "CVE-2024-56610", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "kcsan: Turn report_filterlist_lock into a raw_spinlock, with a KCSAN-enabled PREEMPT_RT kernel, we can see splats like sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56610" }, { "cve": "CVE-2024-56615", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bpf: OOB devmap writes when deleting elements against XSKMAP which also applies to DEVMAP - the index used for accessing map entry, due to being a signed integer, causes the OOB writes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56615" }, { "cve": "CVE-2024-56619", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: When searching for records in a directory where the inode\u0027s i_size is corrupted and has a large value, memory access outside the folio/page range may occur, or a use-after-free bug may be detected if KASAN is enabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56619" }, { "cve": "CVE-2024-56623", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: qla2xxx: System crash is observed with stack trace warning of use after free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56623" }, { "cve": "CVE-2024-56629", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "HID: wacom: Due to incorrect dev-\u003eproduct reporting by certain devices, null pointer dereferences occur when dev-\u003eproduct is empty, leading to potential system crashes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56629" }, { "cve": "CVE-2024-56630", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: iput() is not called when new_inode() succeeded and dquot_initialize() failed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56630" }, { "cve": "CVE-2024-56633", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tcp_bpf: The current sk memory accounting logic in __SK_REDIRECT is pre-uncharging tosend bytes, which is either msg-\u003esg.size or a smaller value apply_bytes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56633" }, { "cve": "CVE-2024-56634", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "gpio: grgpio: vulnerability due to a missing NULL check in grgpio_probe for the return value of devm_kasprintf(), leading to a kernel NULL pointer dereference error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56634" }, { "cve": "CVE-2024-56636", "cwe": { "id": "CWE-241", "name": "Improper Handling of Unexpected Data Type" }, "notes": [ { "category": "summary", "text": "geneve: vulnerability in geneve_xmit_skb() arises from incorrectly assuming the MAC header is set in the output path, which can lead to errors. The fix involves using skb_eth_hdr() instead of eth_hdr() to ensure the MAC header is correctly referenced, preventing potential issues.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56636" }, { "cve": "CVE-2024-56637", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "netfilter: ipset: vulnerability involves a race condition where the ip_set.ko module can be unloaded by user space while it is requesting a set type backend module, potentially causing a kernel crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56637" }, { "cve": "CVE-2024-56642", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tipc: vulnerability in TIPC (Transparent Inter-Process Communication) involves a use-after-free issue with the UDP kernel socket in cleanup_bearer(), caused by premature reference count decrements, which is resolved by moving the decrement after releasing the socket.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56642" }, { "cve": "CVE-2024-56643", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "dccp: vulnerability in DCCP (Datagram Congestion Control Protocol) involves a memory leak in dccp_feat_change_recv where memory allocated for a new SP feature value is not freed if dccp_feat_push_confirm() fails, leading to potential resource exhaustion.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56643" }, { "cve": "CVE-2024-56644", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked in ip6_negative_advice() when this function is executed for an expired IPv6 route located in the exception table.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56644" }, { "cve": "CVE-2024-56645", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "can: j1939: vulnerability involves a reference count underflow issue in j1939_session_new(), which is fixed by adding an extra skb_get() to match the behavior of j1939_session_skb_queue().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56645" }, { "cve": "CVE-2024-56648", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: hsr: avoid potential out-of-bound access in fill_frame_info(). By extending the check to cover packets with only 14 bytes, it prevents uninitialized values from causing undefined behavior or security issues.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56648" }, { "cve": "CVE-2024-56650", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: fix LED ID check in led_tg_check() Syzbot has reported the following BUG detected by KASAN", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56650" }, { "cve": "CVE-2024-56659", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: lapb: It is unclear if net/lapb code is supposed to be ready for 8021q, this may lead to crashes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56659" }, { "cve": "CVE-2024-56661", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tipc: NULL deref in cleanup_bearer().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56661" }, { "cve": "CVE-2024-56662", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56662" }, { "cve": "CVE-2024-56670", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: gadget: u_serial: gs_start_io crashed due to accessing null pointer. Considering that in some extreme cases, when u_serial driver is accessed by multiple threads, Thread A is executing the open operation and calling the gs_open, Thread B is executing the disconnect operation and calling the gserial_disconnect function, the port-\u003eport_usb pointer will be set to NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56670" }, { "cve": "CVE-2024-56681", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "crypto: bcm - add error check in the ahash_hmac_init function The ahash_init functions may return fails. The ahash_hmac_init should not return ok when ahash_init returns error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56681" }, { "cve": "CVE-2024-56688", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport Since transport-\u003esock has been set to NULL during reset transport, XPRT_SOCK_UPD_TIMEOUT also needs to be cleared.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56688" }, { "cve": "CVE-2024-56690", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56690" }, { "cve": "CVE-2024-56691", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device While design wise the idea of converting the driver to use the hierarchy of the IRQ chips is correct, the implementation has (inherited) flaws.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56691" }, { "cve": "CVE-2024-56698", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: dwc3: gadget: looping of queued SG entries The dwc3_request-\u003enum_queued_sgs is decremented on completion. If a partially completed request is handled, then the dwc3_request-\u003enum_queued_sgs no longer reflects the total number of num_queued_sgs (it would be cleared).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56698" }, { "cve": "CVE-2024-56700", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: wl128x: Atomicity violation occurs when the fmc_send_cmd() function is executed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56700" }, { "cve": "CVE-2024-56701", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "powerpc/pseries: The dtl_access_lock needs to be a rw_sempahore, a sleeping lock, because the code calls kmalloc() while holding it, which can sleep.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56701" }, { "cve": "CVE-2024-56704", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "9p/xen: A fix release of IRQ Kernel logs indicate an IRQ was double-freed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56704" }, { "cve": "CVE-2024-56705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: atomisp: In ia_css_3a_statistics_allocate(), there is no check on the allocation result of the rgby_data memory. If rgby_data is not successfully allocated, it may trigger the assert(host_stats-\u003ergby_data) assertion in ia_css_s3a_hmem_decode().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56705" }, { "cve": "CVE-2024-56720", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bpf, sockmap: Several fixes to bpf_msg_pop_data, 1. In sk_msg_shift_left, it should put_page 2. if (len == 0), returning early is better 3. pop the entire sk_msg (last == msg-\u003esg.size) should be supported 4. Fix for the value of variable \"a\" 5. In sk_msg_shift_left, after shifting, it has already pointed to the next element. Addtional sk_msg_iter_var_next may result in BUG.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56720" }, { "cve": "CVE-2024-56723", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices. While design wise the idea of converting the driver to use the hierarchy of the IRQ chips is correct, the implementation has (inherited) vulnerabilities. This was unveiled when platform_get_irq() had started WARN() on IRQ 0 that is supposed to be a Linux IRQ number (also known as vIRQ).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56723" }, { "cve": "CVE-2024-56724", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device. While design wise the idea of converting the driver to use the hierarchy of the IRQ chips is correct, the implementation has (inherited) vulnerability. This was unveiled when platform_get_irq() had started WARN() on IRQ 0 that is supposed to be a Linux IRQ number (also known as vIRQ).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56724" }, { "cve": "CVE-2024-56728", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c. Add error pointer check after calling otx2_mbox_get_rsp().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56728" }, { "cve": "CVE-2024-56739", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "rtc: check if __rtc_read_time was successful in rtc_timer_do_work() If the __rtc_read_time call fails, the struct rtc_time tm; may contain uninitialized data, or an illegal date/time read from the RTC hardware. When calling rtc_tm_to_ktime later, the result may be a very large value (possibly KTIME_MAX). If there are periodic timers in rtc-\u003etimerqueue, they will continually expire, may causing kernel softlockup.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56739" }, { "cve": "CVE-2024-56741", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "apparmor: test: Fix memory leak for aa_unpack_strdup() The string allocated by kmemdup() in aa_unpack_strdup() is not freed and cause following memory leaks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56741" }, { "cve": "CVE-2024-56746", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "fbdev: sh7760fb: vulnerability involves a potential memory leak in sh7760fb_alloc_mem() where sh7760fb_free_mem() does not release memory correctly if info-\u003escreen_base is not ready, which is fixed by calling dma_free_coherent() instead.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56746" }, { "cve": "CVE-2024-56747", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: qedi: vulnerability involves a potential memory leak in qedi_alloc_and_init_sb() where the DMA memory sb_virt is not released upon failure, which is fixed by adding dma_free_coherent() to free the memory, similar to other functions like qedr_alloc_mem_sb() and qede_alloc_mem_sb().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56747" }, { "cve": "CVE-2024-56748", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: qedf: vulnerability involves a potential memory leak in qedf_alloc_and_init_sb() where the DMA memory sb_virt is not released upon failure, which is fixed by adding dma_free_coherent() to free the memory, similar to other functions like qedr_alloc_mem_sb() and qede_alloc_mem_sb().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56748" }, { "cve": "CVE-2024-56754", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "crypto: vulnerability due to passing an incorrect parameter type to devm_add_action_or_reset() in the CAAM driver, which is fixed by ensuring the correct parameter type is used to properly release resources.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56754" }, { "cve": "CVE-2024-56756", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nvme-pci: vulnerability involves an incorrect size being passed to dma_free_coherent in nvme-pci due to __nvme_alloc_host_mem potentially using fewer descriptors than planned, which is fixed by ensuring the correct size is used for freeing the HMB descriptor table.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56756" }, { "cve": "CVE-2024-56770", "cwe": { "id": "CWE-670", "name": "Always-Incorrect Control Flow Implementation" }, "notes": [ { "category": "summary", "text": "net/sched: netem: The interface fully stops transferring packets and \"locks\". In this case, the child qdisc and tfifo are empty, but \u0027qlen\u0027 indicates the tfifo is at its limit and no more packets are accepted.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56770" }, { "cve": "CVE-2024-56779", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur\r\n\r\nThe action force umount(umount -f) will attempt to kill all rpc_task even\r\numount operation may ultimately fail if some files remain open.\r\nConsequently, if an action attempts to open a file, it can potentially\r\nsend two rpc_task to nfs server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56779" }, { "cve": "CVE-2024-56780", "cwe": { "id": "CWE-833", "name": "Deadlock" }, "notes": [ { "category": "summary", "text": "quota: flush quota_release_work upon quota writeback One of the paths quota writeback is called from is: freeze_super() sync_filesystem() ext4_sync_fs() dquot_writeback_dquots().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56780" }, { "cve": "CVE-2024-56781", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "powerpc/prom_init: missing powermac #size-cells.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56781" }, { "cve": "CVE-2024-56785", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "notes": [ { "category": "summary", "text": "MIPS: Loongson64: DTS: issues with PCIe port nodes for ls7a.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56785" }, { "cve": "CVE-2024-57874", "cwe": { "id": "CWE-824", "name": "Access of Uninitialized Pointer" }, "notes": [ { "category": "summary", "text": "arm64: ptrace: vulnerability due to an uninitialized variable in the tagged_addr_ctrl_set() function, leading to potential memory leakage from the kernel stack when a zero-length SETREGSET call is made, exposing up to 64 bits of memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-57874" } ] }
ghsa-jgpx-8fg9-hh7j
Vulnerability from github
Published
2024-09-13 15:31
Modified
2024-09-13 15:31
VLAI Severity ?
Details
In the Linux kernel, the following vulnerability has been resolved:
perf/aux: Fix AUX buffer serialization
Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it.
Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.
{ "affected": [], "aliases": [ "CVE-2024-46713" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-09-13T15:15:15Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/aux: Fix AUX buffer serialization\n\nOle reported that event-\u003emmap_mutex is strictly insufficient to\nserialize the AUX buffer, add a per RB mutex to fully serialize it.\n\nNote that in the lock order comment the perf_event::mmap_mutex order\nwas already wrong, that is, it nesting under mmap_lock is not new with\nthis patch.", "id": "GHSA-jgpx-8fg9-hh7j", "modified": "2024-09-13T15:31:35Z", "published": "2024-09-13T15:31:35Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-46713" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/2ab9d830262c132ab5db2f571003d80850d56b2a" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/52d13d224fdf1299c8b642807fa1ea14d693f5ff" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/7882923f1cb88dc1a17f2bf0c81b1fc80d44db82" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/9dc7ad2b67772cfb94ceb3b0c9c4023c2463215d" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/b9b6882e243b653d379abbeaa64a500182aba370" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/c4b69bee3f4ef76809288fe6827bc14d4ae788ef" } ], "schema_version": "1.4.0", "severity": [] }
suse-su-2025:02846-1
Vulnerability from csaf_suse
Published
2025-08-18 15:47
Modified
2025-08-18 15:47
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-46984: Fixed an out of bounds access in kyber_bio_merge() in kyber (bsc#1220631).
- CVE-2021-46987: btrfs: fix deadlock when cloning inline extents and using qgroups (bsc#1220704).
- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference (bsc#1205711).
- CVE-2022-49138: Bluetooth: hci_event: Fix checking conn for le_conn_complete_evt (bsc#1238160).
- CVE-2022-49319: iommu/arm-smmu-v3: check return value after calling platform_get_resource() (bsc#1238374).
- CVE-2022-49323: iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe() (bsc#1238400).
- CVE-2022-49768: 9p/fd: fix issue of list_del corruption in p9_fd_cancel() (bsc#1242446).
- CVE-2022-49825: ata: libata-transport: fix error handling in ata_tport_add() (bsc#1242548).
- CVE-2022-49934: wifi: mac80211: Fix UAF in ieee80211_scan_rx() (bsc#1245051).
- CVE-2022-49948: vt: Clear selection before changing the font (bsc#1245058).
- CVE-2022-49969: drm/amd/display: clear optc underflow before turn off odm clock (bsc#1245060).
- CVE-2022-49993: loop: Check for overflow while configuring loop (bsc#1245121).
- CVE-2022-50025: cxl: Fix a memory leak in an error handling path (bsc#1245132).
- CVE-2022-50027: scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1245073).
- CVE-2022-50030: scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1245265).
- CVE-2022-50033: usb: host: ohci-ppc-of: Fix refcount leak bug (bsc#1245139).
- CVE-2022-50103: sched, cpuset: Fix dl_cpu_busy() panic due to empty cs->cpus_allowed (bsc#1244840).
- CVE-2022-50149: driver core: fix potential deadlock in __driver_attach (bsc#1244883).
- CVE-2022-50226: crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (bsc#1244860).
- CVE-2023-2176: Fixed an out-of-boundary read in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA (bsc#1210629).
- CVE-2023-52878: can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (bsc#1225000).
- CVE-2023-53020: l2tp: close all race conditions in l2tp_tunnel_register() (bsc#1240224).
- CVE-2023-53117: fs: prevent out-of-bounds array speculation when closing a file descriptor (bsc#1242780).
- CVE-2023-53118: scsi: core: Fix a procfs host directory removal regression (bsc#1242365).
- CVE-2024-26974: crypto: qat - resolve race condition during AER recovery (bsc#1223638).
- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).
- CVE-2024-44963: btrfs: do not BUG_ON() when freeing tree block after error (bsc#1230216).
- CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization (bsc#1230581).
- CVE-2024-49861: net: clear the dst when changing skb protocol (bsc#1245954).
- CVE-2025-21731: nbd: do not allow reconnect after disconnect (bsc#1237881).
- CVE-2025-21928: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (bsc#1240722).
- CVE-2025-23163: net: vlan: do not propagate flags on open (bsc#1242837).
- CVE-2025-37856: btrfs: harden block_group::bg_list against list_del() races (bsc#1243068).
- CVE-2025-37885: KVM: x86: Reset IRTE to host control if *new* route isn't postable (bsc#1242960).
- CVE-2025-37920: kABI workaround for xsk: Fix race condition in AF_XDP generic RX path (bsc#1243479).
- CVE-2025-38034: btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref (bsc#1244792).
- CVE-2025-38035: nvmet-tcp: do not restore null sk_state_change (bsc#1244801).
- CVE-2025-38040: serial: mctrl_gpio: split disable_ms into sync and no_sync APIs (bsc#1245078).
- CVE-2025-38051: smb: client: Fix use-after-free in cifs_fill_dirent (bsc#1244750).
- CVE-2025-38058: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock (bsc#1245151).
- CVE-2025-38064: virtio: break and reset virtio devices on device_shutdown() (bsc#1245201).
- CVE-2025-38068: crypto: lzo - Fix compression buffer overrun (bsc#1245210).
- CVE-2025-38074: vhost-scsi: protect vq->log_used with vq->mutex (bsc#1244735).
- CVE-2025-38079: crypto: algif_hash - fix double free in hash_accept (bsc#1245217).
- CVE-2025-38094: net: cadence: macb: Fix a possible deadlock in macb_halt_tx (bsc#1245649).
- CVE-2025-38105: ALSA: usb-audio: Kill timer properly at removal (bsc#1245682).
- CVE-2025-38108: net_sched: red: fix a race in __red_change() (bsc#1245675).
- CVE-2025-38112: net: Fix TOCTOU issue in sk_is_readable() (bsc#1245668).
- CVE-2025-38115: net_sched: sch_sfq: fix a potential crash on gso_skb handling (bsc#1245689).
- CVE-2025-38126: net: stmmac: make sure that ptp_rate is not 0 before configuring timestamping (bsc#1245708).
- CVE-2025-38147: calipso: unlock rcu before returning -EAFNOSUPPORT (bsc#1245768).
- CVE-2025-38157: wifi: ath9k_htc: Abort software beacon handling if disabled (bsc#1245747).
- CVE-2025-38161: RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (bsc#1245777).
- CVE-2025-38166: bpf: fix ktls panic with sockmap (bsc#1245758).
- CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).
- CVE-2025-38181: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246000).
- CVE-2025-38193: net_sched: sch_sfq: reject invalid perturb period (bsc#1245945).
- CVE-2025-38198: fbcon: Make sure modelist not set on unregistered console (bsc#1245952).
- CVE-2025-38200: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (bsc#1246045).
- CVE-2025-38211: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (bsc#1246008).
- CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246029).
- CVE-2025-38213: vgacon: Add check for vc_origin address range in vgacon_scroll() (bsc#1246037).
- CVE-2025-38222: ext4: inline: fix len overflow in ext4_prepare_inline_data (bsc#1245976).
- CVE-2025-38249: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() (bsc#1246171).
- CVE-2025-38250: kABI workaround for bluetooth hci_dev changes (bsc#1246182).
- CVE-2025-38264: llist: add interface to check if a node is on a list (bsc#1246387).
- CVE-2025-38312: fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() (bsc#1246386).
- CVE-2025-38319: drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table (bsc#1246243).
- CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).
- CVE-2025-38337: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() (bsc#1246253).
- CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781).
- CVE-2025-38375: virtio-net: ensure the received length does not exceed allocated size (bsc#1247177).
- CVE-2025-38391: usb: typec: altmodes/displayport: do not index invalid pin_assignments (bsc#1247181).
- CVE-2025-38403: vsock/vmci: Clear the vmci transport packet properly when initializing it (bsc#1247141).
- CVE-2025-38415: Squashfs: check return result of sb_min_blocksize (bsc#1247147).
- CVE-2025-38420: wifi: carl9170: do not ping device which has failed to load firmware (bsc#1247279).
- CVE-2025-38468: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (bsc#1247437).
- CVE-2025-38477: net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class (bsc#1247314).
- CVE-2025-38494: HID: core: do not bypass hid_hw_raw_request (bsc#1247349).
- CVE-2025-38495: HID: core: ensure the allocated report buffer can contain the reserved report ID (bsc#1247348).
The following non-security bugs were fixed:
- RDMA/core: Always release restrack object (git-fixes)
- bdi: Fix up kabi for dev_name addition (bsc#1171844).
- bdi: add a ->dev_name field to struct backing_dev_info (bsc#1171844).
- l2tp: Do not sleep and disable BH under writer-side sk_callback_lock (git-fixes).
- l2tp: fix a sock refcnt leak in l2tp_tunnel_register (git-fixes).
- scsi: core: Fix a source code comment (git-fixes).
- scsi: core: Fix unremoved procfs host directory regression (git-fixes).
- scsi: drivers: base: Propagate errors through the transport component (bsc#1242548)
- scsi: drivers: base: Support atomic version of attribute_container_device_trigger (bsc#1242548)
- virtgpu: do not reset on shutdown (git-fixes).
Patchnames
SUSE-2025-2846,SUSE-SLE-Live-Patching-12-SP5-2025-2846,SUSE-SLE-SERVER-12-SP5-LTSS-2025-2846,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2846
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-46984: Fixed an out of bounds access in kyber_bio_merge() in kyber (bsc#1220631).\n- CVE-2021-46987: btrfs: fix deadlock when cloning inline extents and using qgroups (bsc#1220704).\n- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference (bsc#1205711).\n- CVE-2022-49138: Bluetooth: hci_event: Fix checking conn for le_conn_complete_evt (bsc#1238160).\n- CVE-2022-49319: iommu/arm-smmu-v3: check return value after calling platform_get_resource() (bsc#1238374).\n- CVE-2022-49323: iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe() (bsc#1238400).\n- CVE-2022-49768: 9p/fd: fix issue of list_del corruption in p9_fd_cancel() (bsc#1242446).\n- CVE-2022-49825: ata: libata-transport: fix error handling in ata_tport_add() (bsc#1242548).\n- CVE-2022-49934: wifi: mac80211: Fix UAF in ieee80211_scan_rx() (bsc#1245051).\n- CVE-2022-49948: vt: Clear selection before changing the font (bsc#1245058).\n- CVE-2022-49969: drm/amd/display: clear optc underflow before turn off odm clock (bsc#1245060).\n- CVE-2022-49993: loop: Check for overflow while configuring loop (bsc#1245121).\n- CVE-2022-50025: cxl: Fix a memory leak in an error handling path (bsc#1245132).\n- CVE-2022-50027: scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1245073).\n- CVE-2022-50030: scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1245265).\n- CVE-2022-50033: usb: host: ohci-ppc-of: Fix refcount leak bug (bsc#1245139).\n- CVE-2022-50103: sched, cpuset: Fix dl_cpu_busy() panic due to empty cs-\u003ecpus_allowed (bsc#1244840).\n- CVE-2022-50149: driver core: fix potential deadlock in __driver_attach (bsc#1244883).\n- CVE-2022-50226: crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (bsc#1244860).\n- CVE-2023-2176: Fixed an out-of-boundary read in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA (bsc#1210629).\n- CVE-2023-52878: can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (bsc#1225000).\n- CVE-2023-53020: l2tp: close all race conditions in l2tp_tunnel_register() (bsc#1240224).\n- CVE-2023-53117: fs: prevent out-of-bounds array speculation when closing a file descriptor (bsc#1242780).\n- CVE-2023-53118: scsi: core: Fix a procfs host directory removal regression (bsc#1242365).\n- CVE-2024-26974: crypto: qat - resolve race condition during AER recovery (bsc#1223638).\n- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).\n- CVE-2024-44963: btrfs: do not BUG_ON() when freeing tree block after error (bsc#1230216).\n- CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization (bsc#1230581).\n- CVE-2024-49861: net: clear the dst when changing skb protocol (bsc#1245954).\n- CVE-2025-21731: nbd: do not allow reconnect after disconnect (bsc#1237881).\n- CVE-2025-21928: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (bsc#1240722).\n- CVE-2025-23163: net: vlan: do not propagate flags on open (bsc#1242837).\n- CVE-2025-37856: btrfs: harden block_group::bg_list against list_del() races (bsc#1243068).\n- CVE-2025-37885: KVM: x86: Reset IRTE to host control if *new* route isn\u0027t postable (bsc#1242960).\n- CVE-2025-37920: kABI workaround for xsk: Fix race condition in AF_XDP generic RX path (bsc#1243479).\n- CVE-2025-38034: btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref (bsc#1244792).\n- CVE-2025-38035: nvmet-tcp: do not restore null sk_state_change (bsc#1244801).\n- CVE-2025-38040: serial: mctrl_gpio: split disable_ms into sync and no_sync APIs (bsc#1245078).\n- CVE-2025-38051: smb: client: Fix use-after-free in cifs_fill_dirent (bsc#1244750).\n- CVE-2025-38058: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock (bsc#1245151).\n- CVE-2025-38064: virtio: break and reset virtio devices on device_shutdown() (bsc#1245201).\n- CVE-2025-38068: crypto: lzo - Fix compression buffer overrun (bsc#1245210).\n- CVE-2025-38074: vhost-scsi: protect vq-\u003elog_used with vq-\u003emutex (bsc#1244735).\n- CVE-2025-38079: crypto: algif_hash - fix double free in hash_accept (bsc#1245217).\n- CVE-2025-38094: net: cadence: macb: Fix a possible deadlock in macb_halt_tx (bsc#1245649).\n- CVE-2025-38105: ALSA: usb-audio: Kill timer properly at removal (bsc#1245682).\n- CVE-2025-38108: net_sched: red: fix a race in __red_change() (bsc#1245675).\n- CVE-2025-38112: net: Fix TOCTOU issue in sk_is_readable() (bsc#1245668).\n- CVE-2025-38115: net_sched: sch_sfq: fix a potential crash on gso_skb handling (bsc#1245689).\n- CVE-2025-38126: net: stmmac: make sure that ptp_rate is not 0 before configuring timestamping (bsc#1245708).\n- CVE-2025-38147: calipso: unlock rcu before returning -EAFNOSUPPORT (bsc#1245768).\n- CVE-2025-38157: wifi: ath9k_htc: Abort software beacon handling if disabled (bsc#1245747).\n- CVE-2025-38161: RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (bsc#1245777).\n- CVE-2025-38166: bpf: fix ktls panic with sockmap (bsc#1245758).\n- CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).\n- CVE-2025-38181: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246000).\n- CVE-2025-38193: net_sched: sch_sfq: reject invalid perturb period (bsc#1245945).\n- CVE-2025-38198: fbcon: Make sure modelist not set on unregistered console (bsc#1245952).\n- CVE-2025-38200: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (bsc#1246045).\n- CVE-2025-38211: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (bsc#1246008).\n- CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246029).\n- CVE-2025-38213: vgacon: Add check for vc_origin address range in vgacon_scroll() (bsc#1246037).\n- CVE-2025-38222: ext4: inline: fix len overflow in ext4_prepare_inline_data (bsc#1245976).\n- CVE-2025-38249: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() (bsc#1246171).\n- CVE-2025-38250: kABI workaround for bluetooth hci_dev changes (bsc#1246182).\n- CVE-2025-38264: llist: add interface to check if a node is on a list (bsc#1246387).\n- CVE-2025-38312: fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() (bsc#1246386).\n- CVE-2025-38319: drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table (bsc#1246243).\n- CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).\n- CVE-2025-38337: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() (bsc#1246253).\n- CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781).\n- CVE-2025-38375: virtio-net: ensure the received length does not exceed allocated size (bsc#1247177).\n- CVE-2025-38391: usb: typec: altmodes/displayport: do not index invalid pin_assignments (bsc#1247181).\n- CVE-2025-38403: vsock/vmci: Clear the vmci transport packet properly when initializing it (bsc#1247141).\n- CVE-2025-38415: Squashfs: check return result of sb_min_blocksize (bsc#1247147).\n- CVE-2025-38420: wifi: carl9170: do not ping device which has failed to load firmware (bsc#1247279).\n- CVE-2025-38468: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (bsc#1247437).\n- CVE-2025-38477: net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class (bsc#1247314).\n- CVE-2025-38494: HID: core: do not bypass hid_hw_raw_request (bsc#1247349).\n- CVE-2025-38495: HID: core: ensure the allocated report buffer can contain the reserved report ID (bsc#1247348).\n\nThe following non-security bugs were fixed:\n\n- RDMA/core: Always release restrack object (git-fixes)\n- bdi: Fix up kabi for dev_name addition (bsc#1171844).\n- bdi: add a -\u003edev_name field to struct backing_dev_info (bsc#1171844).\n- l2tp: Do not sleep and disable BH under writer-side sk_callback_lock (git-fixes).\n- l2tp: fix a sock refcnt leak in l2tp_tunnel_register (git-fixes).\n- scsi: core: Fix a source code comment (git-fixes).\n- scsi: core: Fix unremoved procfs host directory regression (git-fixes).\n- scsi: drivers: base: Propagate errors through the transport component (bsc#1242548)\n- scsi: drivers: base: Support atomic version of attribute_container_device_trigger (bsc#1242548)\n- virtgpu: do not reset on shutdown (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-2846,SUSE-SLE-Live-Patching-12-SP5-2025-2846,SUSE-SLE-SERVER-12-SP5-LTSS-2025-2846,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2846", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02846-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:02846-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502846-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:02846-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" }, { "category": "self", "summary": "SUSE Bug 1171844", "url": "https://bugzilla.suse.com/1171844" }, { "category": "self", "summary": "SUSE Bug 1205711", "url": "https://bugzilla.suse.com/1205711" }, { "category": "self", "summary": "SUSE Bug 1210629", "url": "https://bugzilla.suse.com/1210629" }, { "category": "self", "summary": "SUSE Bug 1220631", "url": "https://bugzilla.suse.com/1220631" }, { "category": "self", "summary": "SUSE Bug 1220704", "url": "https://bugzilla.suse.com/1220704" }, { "category": "self", "summary": "SUSE Bug 1223634", "url": "https://bugzilla.suse.com/1223634" }, { "category": "self", "summary": "SUSE Bug 1223638", "url": "https://bugzilla.suse.com/1223638" }, { "category": "self", "summary": "SUSE Bug 1225000", "url": "https://bugzilla.suse.com/1225000" }, { "category": "self", "summary": "SUSE Bug 1230216", "url": "https://bugzilla.suse.com/1230216" }, { "category": "self", "summary": "SUSE Bug 1230581", "url": "https://bugzilla.suse.com/1230581" }, { "category": "self", "summary": "SUSE Bug 1237881", "url": "https://bugzilla.suse.com/1237881" }, { "category": "self", "summary": "SUSE Bug 1238160", "url": "https://bugzilla.suse.com/1238160" }, { "category": "self", "summary": "SUSE Bug 1238374", "url": "https://bugzilla.suse.com/1238374" }, { "category": "self", "summary": "SUSE Bug 1238400", "url": "https://bugzilla.suse.com/1238400" }, { "category": "self", "summary": "SUSE Bug 1240224", "url": "https://bugzilla.suse.com/1240224" }, { "category": "self", "summary": "SUSE Bug 1240722", "url": "https://bugzilla.suse.com/1240722" }, { "category": "self", "summary": "SUSE Bug 1242365", "url": "https://bugzilla.suse.com/1242365" }, { "category": "self", "summary": "SUSE Bug 1242414", "url": "https://bugzilla.suse.com/1242414" }, { "category": "self", "summary": "SUSE Bug 1242446", "url": "https://bugzilla.suse.com/1242446" }, { "category": "self", "summary": "SUSE Bug 1242548", "url": "https://bugzilla.suse.com/1242548" }, { "category": "self", "summary": "SUSE Bug 1242780", "url": "https://bugzilla.suse.com/1242780" }, { "category": "self", "summary": "SUSE Bug 1242837", "url": "https://bugzilla.suse.com/1242837" }, { "category": "self", "summary": "SUSE Bug 1242960", "url": "https://bugzilla.suse.com/1242960" }, { "category": "self", "summary": "SUSE Bug 1243068", "url": "https://bugzilla.suse.com/1243068" }, { "category": "self", "summary": "SUSE Bug 1243479", "url": "https://bugzilla.suse.com/1243479" }, { "category": "self", "summary": "SUSE Bug 1244735", "url": "https://bugzilla.suse.com/1244735" }, { "category": "self", "summary": "SUSE Bug 1244750", "url": "https://bugzilla.suse.com/1244750" }, { "category": "self", "summary": "SUSE Bug 1244792", "url": "https://bugzilla.suse.com/1244792" }, { "category": "self", "summary": "SUSE Bug 1244801", "url": "https://bugzilla.suse.com/1244801" }, { "category": "self", "summary": "SUSE Bug 1244840", "url": "https://bugzilla.suse.com/1244840" }, { "category": "self", "summary": "SUSE Bug 1244860", "url": "https://bugzilla.suse.com/1244860" }, { "category": "self", "summary": "SUSE Bug 1244883", "url": "https://bugzilla.suse.com/1244883" }, { "category": "self", "summary": "SUSE Bug 1245051", "url": "https://bugzilla.suse.com/1245051" }, { "category": "self", "summary": "SUSE Bug 1245058", "url": "https://bugzilla.suse.com/1245058" }, { "category": "self", "summary": "SUSE Bug 1245060", "url": "https://bugzilla.suse.com/1245060" }, { "category": "self", "summary": "SUSE Bug 1245073", "url": "https://bugzilla.suse.com/1245073" }, { "category": "self", "summary": "SUSE Bug 1245078", "url": "https://bugzilla.suse.com/1245078" }, { "category": "self", "summary": "SUSE Bug 1245121", "url": "https://bugzilla.suse.com/1245121" }, { "category": "self", "summary": "SUSE Bug 1245132", "url": "https://bugzilla.suse.com/1245132" }, { "category": "self", "summary": "SUSE Bug 1245139", "url": "https://bugzilla.suse.com/1245139" }, { "category": "self", "summary": "SUSE Bug 1245151", "url": "https://bugzilla.suse.com/1245151" }, { "category": "self", "summary": "SUSE Bug 1245201", "url": "https://bugzilla.suse.com/1245201" }, { "category": "self", "summary": "SUSE Bug 1245210", "url": "https://bugzilla.suse.com/1245210" }, { "category": "self", "summary": "SUSE Bug 1245217", "url": "https://bugzilla.suse.com/1245217" }, { "category": "self", "summary": "SUSE Bug 1245265", "url": "https://bugzilla.suse.com/1245265" }, { "category": "self", "summary": "SUSE Bug 1245649", "url": "https://bugzilla.suse.com/1245649" }, { "category": "self", "summary": "SUSE Bug 1245668", "url": "https://bugzilla.suse.com/1245668" }, { "category": "self", "summary": "SUSE Bug 1245675", "url": "https://bugzilla.suse.com/1245675" }, { "category": "self", "summary": "SUSE Bug 1245682", "url": "https://bugzilla.suse.com/1245682" }, { "category": "self", "summary": "SUSE Bug 1245689", "url": "https://bugzilla.suse.com/1245689" }, { "category": "self", "summary": "SUSE Bug 1245708", "url": "https://bugzilla.suse.com/1245708" }, { "category": "self", "summary": "SUSE Bug 1245747", "url": "https://bugzilla.suse.com/1245747" }, { "category": "self", "summary": "SUSE Bug 1245758", "url": "https://bugzilla.suse.com/1245758" }, { "category": "self", "summary": "SUSE Bug 1245768", "url": "https://bugzilla.suse.com/1245768" }, { "category": "self", "summary": "SUSE Bug 1245777", "url": "https://bugzilla.suse.com/1245777" }, { "category": "self", "summary": "SUSE Bug 1245945", "url": "https://bugzilla.suse.com/1245945" }, { "category": "self", "summary": "SUSE Bug 1245952", "url": "https://bugzilla.suse.com/1245952" }, { "category": "self", "summary": "SUSE Bug 1245954", "url": "https://bugzilla.suse.com/1245954" }, { "category": "self", "summary": "SUSE Bug 1245970", "url": "https://bugzilla.suse.com/1245970" }, { "category": "self", "summary": "SUSE Bug 1245976", "url": "https://bugzilla.suse.com/1245976" }, { "category": "self", "summary": "SUSE Bug 1245986", "url": "https://bugzilla.suse.com/1245986" }, { "category": "self", "summary": "SUSE Bug 1246000", "url": "https://bugzilla.suse.com/1246000" }, { "category": "self", "summary": "SUSE Bug 1246008", "url": "https://bugzilla.suse.com/1246008" }, { "category": "self", "summary": "SUSE Bug 1246029", "url": "https://bugzilla.suse.com/1246029" }, { "category": "self", "summary": "SUSE Bug 1246037", "url": "https://bugzilla.suse.com/1246037" }, { "category": "self", "summary": "SUSE Bug 1246045", "url": "https://bugzilla.suse.com/1246045" }, { "category": "self", "summary": "SUSE Bug 1246171", "url": "https://bugzilla.suse.com/1246171" }, { "category": "self", "summary": "SUSE Bug 1246182", "url": "https://bugzilla.suse.com/1246182" }, { "category": "self", "summary": "SUSE Bug 1246243", "url": "https://bugzilla.suse.com/1246243" }, { "category": "self", "summary": "SUSE Bug 1246253", "url": "https://bugzilla.suse.com/1246253" }, { "category": "self", "summary": "SUSE Bug 1246386", "url": "https://bugzilla.suse.com/1246386" }, { "category": "self", "summary": "SUSE Bug 1246387", "url": "https://bugzilla.suse.com/1246387" }, { "category": "self", "summary": "SUSE Bug 1246459", "url": "https://bugzilla.suse.com/1246459" }, { "category": "self", "summary": "SUSE Bug 1246473", "url": "https://bugzilla.suse.com/1246473" }, { "category": "self", "summary": "SUSE Bug 1246781", "url": "https://bugzilla.suse.com/1246781" }, { "category": "self", "summary": "SUSE Bug 1247141", "url": "https://bugzilla.suse.com/1247141" }, { "category": "self", "summary": "SUSE Bug 1247147", "url": "https://bugzilla.suse.com/1247147" }, { "category": "self", "summary": "SUSE Bug 1247177", "url": "https://bugzilla.suse.com/1247177" }, { "category": "self", "summary": "SUSE Bug 1247181", "url": "https://bugzilla.suse.com/1247181" }, { "category": "self", "summary": "SUSE Bug 1247279", "url": "https://bugzilla.suse.com/1247279" }, { "category": "self", "summary": "SUSE Bug 1247314", "url": "https://bugzilla.suse.com/1247314" }, { "category": "self", "summary": "SUSE Bug 1247348", "url": "https://bugzilla.suse.com/1247348" }, { "category": "self", "summary": "SUSE Bug 1247349", "url": "https://bugzilla.suse.com/1247349" }, { "category": "self", "summary": "SUSE Bug 1247437", "url": "https://bugzilla.suse.com/1247437" }, { "category": "self", "summary": "SUSE CVE CVE-2021-46984 page", "url": "https://www.suse.com/security/cve/CVE-2021-46984/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-46987 page", "url": "https://www.suse.com/security/cve/CVE-2021-46987/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4129 page", "url": "https://www.suse.com/security/cve/CVE-2022-4129/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49138 page", "url": "https://www.suse.com/security/cve/CVE-2022-49138/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49319 page", "url": "https://www.suse.com/security/cve/CVE-2022-49319/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49323 page", "url": "https://www.suse.com/security/cve/CVE-2022-49323/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49768 page", "url": "https://www.suse.com/security/cve/CVE-2022-49768/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49825 page", "url": "https://www.suse.com/security/cve/CVE-2022-49825/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49934 page", "url": "https://www.suse.com/security/cve/CVE-2022-49934/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49948 page", "url": "https://www.suse.com/security/cve/CVE-2022-49948/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49969 page", "url": "https://www.suse.com/security/cve/CVE-2022-49969/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49993 page", "url": "https://www.suse.com/security/cve/CVE-2022-49993/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50025 page", "url": "https://www.suse.com/security/cve/CVE-2022-50025/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50027 page", "url": "https://www.suse.com/security/cve/CVE-2022-50027/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50030 page", "url": "https://www.suse.com/security/cve/CVE-2022-50030/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50033 page", "url": "https://www.suse.com/security/cve/CVE-2022-50033/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50103 page", "url": "https://www.suse.com/security/cve/CVE-2022-50103/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50149 page", "url": "https://www.suse.com/security/cve/CVE-2022-50149/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50226 page", "url": "https://www.suse.com/security/cve/CVE-2022-50226/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2176 page", "url": "https://www.suse.com/security/cve/CVE-2023-2176/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52878 page", "url": "https://www.suse.com/security/cve/CVE-2023-52878/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-53020 page", "url": "https://www.suse.com/security/cve/CVE-2023-53020/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-53117 page", "url": "https://www.suse.com/security/cve/CVE-2023-53117/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-53118 page", "url": "https://www.suse.com/security/cve/CVE-2023-53118/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-26974 page", "url": "https://www.suse.com/security/cve/CVE-2024-26974/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-26982 page", "url": "https://www.suse.com/security/cve/CVE-2024-26982/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-44963 page", "url": "https://www.suse.com/security/cve/CVE-2024-44963/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-46713 page", "url": "https://www.suse.com/security/cve/CVE-2024-46713/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-49861 page", "url": "https://www.suse.com/security/cve/CVE-2024-49861/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-21731 page", "url": "https://www.suse.com/security/cve/CVE-2025-21731/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-21928 page", "url": "https://www.suse.com/security/cve/CVE-2025-21928/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23163 page", "url": "https://www.suse.com/security/cve/CVE-2025-23163/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37798 page", "url": "https://www.suse.com/security/cve/CVE-2025-37798/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37856 page", "url": "https://www.suse.com/security/cve/CVE-2025-37856/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37885 page", "url": "https://www.suse.com/security/cve/CVE-2025-37885/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37920 page", "url": "https://www.suse.com/security/cve/CVE-2025-37920/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38034 page", "url": "https://www.suse.com/security/cve/CVE-2025-38034/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38035 page", "url": "https://www.suse.com/security/cve/CVE-2025-38035/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38040 page", "url": "https://www.suse.com/security/cve/CVE-2025-38040/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38051 page", "url": "https://www.suse.com/security/cve/CVE-2025-38051/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38058 page", "url": "https://www.suse.com/security/cve/CVE-2025-38058/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38064 page", "url": "https://www.suse.com/security/cve/CVE-2025-38064/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38068 page", "url": "https://www.suse.com/security/cve/CVE-2025-38068/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38074 page", "url": "https://www.suse.com/security/cve/CVE-2025-38074/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38079 page", "url": "https://www.suse.com/security/cve/CVE-2025-38079/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38094 page", "url": "https://www.suse.com/security/cve/CVE-2025-38094/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38105 page", "url": "https://www.suse.com/security/cve/CVE-2025-38105/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38108 page", "url": "https://www.suse.com/security/cve/CVE-2025-38108/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38112 page", "url": "https://www.suse.com/security/cve/CVE-2025-38112/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38115 page", "url": "https://www.suse.com/security/cve/CVE-2025-38115/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38126 page", "url": "https://www.suse.com/security/cve/CVE-2025-38126/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38147 page", "url": "https://www.suse.com/security/cve/CVE-2025-38147/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38157 page", "url": "https://www.suse.com/security/cve/CVE-2025-38157/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38161 page", "url": "https://www.suse.com/security/cve/CVE-2025-38161/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38166 page", "url": "https://www.suse.com/security/cve/CVE-2025-38166/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38177 page", "url": "https://www.suse.com/security/cve/CVE-2025-38177/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38180 page", "url": "https://www.suse.com/security/cve/CVE-2025-38180/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38181 page", "url": "https://www.suse.com/security/cve/CVE-2025-38181/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38192 page", "url": "https://www.suse.com/security/cve/CVE-2025-38192/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38193 page", "url": "https://www.suse.com/security/cve/CVE-2025-38193/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38198 page", "url": "https://www.suse.com/security/cve/CVE-2025-38198/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38200 page", "url": "https://www.suse.com/security/cve/CVE-2025-38200/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38211 page", "url": "https://www.suse.com/security/cve/CVE-2025-38211/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38212 page", "url": "https://www.suse.com/security/cve/CVE-2025-38212/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38213 page", "url": "https://www.suse.com/security/cve/CVE-2025-38213/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38222 page", "url": "https://www.suse.com/security/cve/CVE-2025-38222/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38249 page", "url": "https://www.suse.com/security/cve/CVE-2025-38249/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38250 page", "url": "https://www.suse.com/security/cve/CVE-2025-38250/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38264 page", "url": "https://www.suse.com/security/cve/CVE-2025-38264/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38312 page", "url": "https://www.suse.com/security/cve/CVE-2025-38312/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38319 page", "url": "https://www.suse.com/security/cve/CVE-2025-38319/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38323 page", "url": "https://www.suse.com/security/cve/CVE-2025-38323/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38337 page", "url": "https://www.suse.com/security/cve/CVE-2025-38337/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38350 page", "url": "https://www.suse.com/security/cve/CVE-2025-38350/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38375 page", "url": "https://www.suse.com/security/cve/CVE-2025-38375/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38391 page", "url": "https://www.suse.com/security/cve/CVE-2025-38391/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38403 page", "url": "https://www.suse.com/security/cve/CVE-2025-38403/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38415 page", "url": "https://www.suse.com/security/cve/CVE-2025-38415/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38420 page", "url": "https://www.suse.com/security/cve/CVE-2025-38420/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38468 page", "url": "https://www.suse.com/security/cve/CVE-2025-38468/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38477 page", "url": "https://www.suse.com/security/cve/CVE-2025-38477/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38494 page", "url": "https://www.suse.com/security/cve/CVE-2025-38494/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38495 page", "url": "https://www.suse.com/security/cve/CVE-2025-38495/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2025-08-18T15:47:45Z", "generator": { "date": "2025-08-18T15:47:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:02846-1", "initial_release_date": "2025-08-18T15:47:45Z", "revision_history": [ { "date": "2025-08-18T15:47:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-122.269.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.269.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-122.269.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-122.269.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.269.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-122.269.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-122.269.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.269.1.aarch64", "product": { "name": "kernel-default-4.12.14-122.269.1.aarch64", "product_id": "kernel-default-4.12.14-122.269.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.269.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-122.269.1.aarch64", "product_id": "kernel-default-base-4.12.14-122.269.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.269.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-122.269.1.aarch64", "product_id": "kernel-default-devel-4.12.14-122.269.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.269.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-122.269.1.aarch64", "product_id": "kernel-default-extra-4.12.14-122.269.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.269.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-122.269.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-122.269.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.269.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-122.269.1.aarch64", "product_id": "kernel-obs-build-4.12.14-122.269.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.269.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-122.269.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-122.269.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.269.1.aarch64", "product": { "name": "kernel-syms-4.12.14-122.269.1.aarch64", "product_id": "kernel-syms-4.12.14-122.269.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.269.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-122.269.1.aarch64", "product_id": "kernel-vanilla-4.12.14-122.269.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.269.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-122.269.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-122.269.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.269.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.269.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-122.269.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.269.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-122.269.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-122.269.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-122.269.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-122.269.1.noarch", "product": { "name": "kernel-devel-4.12.14-122.269.1.noarch", "product_id": "kernel-devel-4.12.14-122.269.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-122.269.1.noarch", "product": { "name": "kernel-docs-4.12.14-122.269.1.noarch", "product_id": "kernel-docs-4.12.14-122.269.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-122.269.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-122.269.1.noarch", "product_id": "kernel-docs-html-4.12.14-122.269.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-122.269.1.noarch", "product": { "name": "kernel-macros-4.12.14-122.269.1.noarch", "product_id": "kernel-macros-4.12.14-122.269.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-122.269.1.noarch", "product": { "name": "kernel-source-4.12.14-122.269.1.noarch", "product_id": "kernel-source-4.12.14-122.269.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-122.269.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-122.269.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-122.269.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.269.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-122.269.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.269.1.ppc64le", "product": { "name": "kernel-default-4.12.14-122.269.1.ppc64le", "product_id": "kernel-default-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.269.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-122.269.1.ppc64le", "product_id": "kernel-default-base-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.269.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-122.269.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.269.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-122.269.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.269.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-122.269.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.269.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-122.269.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.269.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-122.269.1.ppc64le", "product_id": "kernel-syms-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.269.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-122.269.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.269.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-122.269.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.269.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-122.269.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.269.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-122.269.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-122.269.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-122.269.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.269.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-122.269.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.269.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-122.269.1.s390x", "product_id": "dlm-kmp-default-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.269.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-122.269.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.269.1.s390x", "product": { "name": "kernel-default-4.12.14-122.269.1.s390x", "product_id": "kernel-default-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.269.1.s390x", "product": { "name": "kernel-default-base-4.12.14-122.269.1.s390x", "product_id": "kernel-default-base-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.269.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-122.269.1.s390x", "product_id": "kernel-default-devel-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.269.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-122.269.1.s390x", "product_id": "kernel-default-extra-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.269.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-122.269.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-122.269.1.s390x", "product": { "name": "kernel-default-man-4.12.14-122.269.1.s390x", "product_id": "kernel-default-man-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.269.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-122.269.1.s390x", "product_id": "kernel-obs-build-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.269.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-122.269.1.s390x", "product_id": "kernel-obs-qa-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.269.1.s390x", "product": { "name": "kernel-syms-4.12.14-122.269.1.s390x", "product_id": "kernel-syms-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.269.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-122.269.1.s390x", "product_id": "kernel-vanilla-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.269.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-122.269.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.269.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-122.269.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-122.269.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-122.269.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-122.269.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-122.269.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "product_id": "kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.269.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-122.269.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-122.269.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.269.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-122.269.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-122.269.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.269.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-122.269.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.269.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-122.269.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.269.1.x86_64", "product": { "name": "kernel-default-4.12.14-122.269.1.x86_64", "product_id": "kernel-default-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.269.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-122.269.1.x86_64", "product_id": "kernel-default-base-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.269.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-122.269.1.x86_64", "product_id": "kernel-default-devel-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.269.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-122.269.1.x86_64", "product_id": "kernel-default-extra-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.269.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-122.269.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-122.269.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-122.269.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-122.269.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-122.269.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-122.269.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-122.269.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.269.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-122.269.1.x86_64", "product_id": "kernel-obs-build-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.269.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-122.269.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.269.1.x86_64", "product": { "name": "kernel-syms-4.12.14-122.269.1.x86_64", "product_id": "kernel-syms-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.269.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-122.269.1.x86_64", "product_id": "kernel-vanilla-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.269.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-122.269.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.269.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.269.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.269.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-122.269.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-122.269.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-122.269.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product": { "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.269.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.269.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-122.269.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.269.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.269.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.269.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.269.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.269.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.269.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-122.269.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.269.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-122.269.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.269.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-122.269.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.269.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.269.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.269.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.269.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-122.269.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.269.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.269.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.269.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.269.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.269.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.269.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.269.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.269.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.269.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.269.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.269.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.269.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.269.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.269.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.269.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.269.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.269.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.269.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.269.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.269.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.269.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.269.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.269.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.269.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.269.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.269.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.269.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.269.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.269.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.269.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.269.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.269.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.269.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.269.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.269.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.269.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.269.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.269.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.269.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.269.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.269.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.269.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.269.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-46984", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-46984" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkyber: fix out of bounds access when preempted\n\n__blk_mq_sched_bio_merge() gets the ctx and hctx for the current CPU and\npasses the hctx to -\u003ebio_merge(). kyber_bio_merge() then gets the ctx\nfor the current CPU again and uses that to get the corresponding Kyber\ncontext in the passed hctx. However, the thread may be preempted between\nthe two calls to blk_mq_get_ctx(), and the ctx returned the second time\nmay no longer correspond to the passed hctx. This \"works\" accidentally\nmost of the time, but it can cause us to read garbage if the second ctx\ncame from an hctx with more ctx\u0027s than the first one (i.e., if\nctx-\u003eindex_hw[hctx-\u003etype] \u003e hctx-\u003enr_ctx).\n\nThis manifested as this UBSAN array index out of bounds error reported\nby Jakub:\n\nUBSAN: array-index-out-of-bounds in ../kernel/locking/qspinlock.c:130:9\nindex 13106 is out of range for type \u0027long unsigned int [128]\u0027\nCall Trace:\n dump_stack+0xa4/0xe5\n ubsan_epilogue+0x5/0x40\n __ubsan_handle_out_of_bounds.cold.13+0x2a/0x34\n queued_spin_lock_slowpath+0x476/0x480\n do_raw_spin_lock+0x1c2/0x1d0\n kyber_bio_merge+0x112/0x180\n blk_mq_submit_bio+0x1f5/0x1100\n submit_bio_noacct+0x7b0/0x870\n submit_bio+0xc2/0x3a0\n btrfs_map_bio+0x4f0/0x9d0\n btrfs_submit_data_bio+0x24e/0x310\n submit_one_bio+0x7f/0xb0\n submit_extent_page+0xc4/0x440\n __extent_writepage_io+0x2b8/0x5e0\n __extent_writepage+0x28d/0x6e0\n extent_write_cache_pages+0x4d7/0x7a0\n extent_writepages+0xa2/0x110\n do_writepages+0x8f/0x180\n __writeback_single_inode+0x99/0x7f0\n writeback_sb_inodes+0x34e/0x790\n __writeback_inodes_wb+0x9e/0x120\n wb_writeback+0x4d2/0x660\n wb_workfn+0x64d/0xa10\n process_one_work+0x53a/0xa80\n worker_thread+0x69/0x5b0\n kthread+0x20b/0x240\n ret_from_fork+0x1f/0x30\n\nOnly Kyber uses the hctx, so fix it by passing the request_queue to\n-\u003ebio_merge() instead. BFQ and mq-deadline just use that, and Kyber can\nmap the queues itself to avoid the mismatch.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-46984", "url": "https://www.suse.com/security/cve/CVE-2021-46984" }, { "category": "external", "summary": "SUSE Bug 1220631 for CVE-2021-46984", "url": "https://bugzilla.suse.com/1220631" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2021-46984" }, { "cve": "CVE-2021-46987", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-46987" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix deadlock when cloning inline extents and using qgroups\n\nThere are a few exceptional cases where cloning an inline extent needs to\ncopy the inline extent data into a page of the destination inode.\n\nWhen this happens, we end up starting a transaction while having a dirty\npage for the destination inode and while having the range locked in the\ndestination\u0027s inode iotree too. Because when reserving metadata space\nfor a transaction we may need to flush existing delalloc in case there is\nnot enough free space, we have a mechanism in place to prevent a deadlock,\nwhich was introduced in commit 3d45f221ce627d (\"btrfs: fix deadlock when\ncloning inline extent and low on free metadata space\").\n\nHowever when using qgroups, a transaction also reserves metadata qgroup\nspace, which can also result in flushing delalloc in case there is not\nenough available space at the moment. When this happens we deadlock, since\nflushing delalloc requires locking the file range in the inode\u0027s iotree\nand the range was already locked at the very beginning of the clone\noperation, before attempting to start the transaction.\n\nWhen this issue happens, stack traces like the following are reported:\n\n [72747.556262] task:kworker/u81:9 state:D stack: 0 pid: 225 ppid: 2 flags:0x00004000\n [72747.556268] Workqueue: writeback wb_workfn (flush-btrfs-1142)\n [72747.556271] Call Trace:\n [72747.556273] __schedule+0x296/0x760\n [72747.556277] schedule+0x3c/0xa0\n [72747.556279] io_schedule+0x12/0x40\n [72747.556284] __lock_page+0x13c/0x280\n [72747.556287] ? generic_file_readonly_mmap+0x70/0x70\n [72747.556325] extent_write_cache_pages+0x22a/0x440 [btrfs]\n [72747.556331] ? __set_page_dirty_nobuffers+0xe7/0x160\n [72747.556358] ? set_extent_buffer_dirty+0x5e/0x80 [btrfs]\n [72747.556362] ? update_group_capacity+0x25/0x210\n [72747.556366] ? cpumask_next_and+0x1a/0x20\n [72747.556391] extent_writepages+0x44/0xa0 [btrfs]\n [72747.556394] do_writepages+0x41/0xd0\n [72747.556398] __writeback_single_inode+0x39/0x2a0\n [72747.556403] writeback_sb_inodes+0x1ea/0x440\n [72747.556407] __writeback_inodes_wb+0x5f/0xc0\n [72747.556410] wb_writeback+0x235/0x2b0\n [72747.556414] ? get_nr_inodes+0x35/0x50\n [72747.556417] wb_workfn+0x354/0x490\n [72747.556420] ? newidle_balance+0x2c5/0x3e0\n [72747.556424] process_one_work+0x1aa/0x340\n [72747.556426] worker_thread+0x30/0x390\n [72747.556429] ? create_worker+0x1a0/0x1a0\n [72747.556432] kthread+0x116/0x130\n [72747.556435] ? kthread_park+0x80/0x80\n [72747.556438] ret_from_fork+0x1f/0x30\n\n [72747.566958] Workqueue: btrfs-flush_delalloc btrfs_work_helper [btrfs]\n [72747.566961] Call Trace:\n [72747.566964] __schedule+0x296/0x760\n [72747.566968] ? finish_wait+0x80/0x80\n [72747.566970] schedule+0x3c/0xa0\n [72747.566995] wait_extent_bit.constprop.68+0x13b/0x1c0 [btrfs]\n [72747.566999] ? finish_wait+0x80/0x80\n [72747.567024] lock_extent_bits+0x37/0x90 [btrfs]\n [72747.567047] btrfs_invalidatepage+0x299/0x2c0 [btrfs]\n [72747.567051] ? find_get_pages_range_tag+0x2cd/0x380\n [72747.567076] __extent_writepage+0x203/0x320 [btrfs]\n [72747.567102] extent_write_cache_pages+0x2bb/0x440 [btrfs]\n [72747.567106] ? update_load_avg+0x7e/0x5f0\n [72747.567109] ? enqueue_entity+0xf4/0x6f0\n [72747.567134] extent_writepages+0x44/0xa0 [btrfs]\n [72747.567137] ? enqueue_task_fair+0x93/0x6f0\n [72747.567140] do_writepages+0x41/0xd0\n [72747.567144] __filemap_fdatawrite_range+0xc7/0x100\n [72747.567167] btrfs_run_delalloc_work+0x17/0x40 [btrfs]\n [72747.567195] btrfs_work_helper+0xc2/0x300 [btrfs]\n [72747.567200] process_one_work+0x1aa/0x340\n [72747.567202] worker_thread+0x30/0x390\n [72747.567205] ? create_worker+0x1a0/0x1a0\n [72747.567208] kthread+0x116/0x130\n [72747.567211] ? kthread_park+0x80/0x80\n [72747.567214] ret_from_fork+0x1f/0x30\n\n [72747.569686] task:fsstress state:D stack: \n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-46987", "url": "https://www.suse.com/security/cve/CVE-2021-46987" }, { "category": "external", "summary": "SUSE Bug 1220704 for CVE-2021-46987", "url": "https://bugzilla.suse.com/1220704" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2021-46987" }, { "cve": "CVE-2022-4129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4129" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4129", "url": "https://www.suse.com/security/cve/CVE-2022-4129" }, { "category": "external", "summary": "SUSE Bug 1205711 for CVE-2022-4129", "url": "https://bugzilla.suse.com/1205711" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-4129" }, { "cve": "CVE-2022-49138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49138" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_event: Ignore multiple conn complete events\n\nWhen one of the three connection complete events is received multiple\ntimes for the same handle, the device is registered multiple times which\nleads to memory corruptions. Therefore, consequent events for a single\nconnection are ignored.\n\nThe conn-\u003estate can hold different values, therefore HCI_CONN_HANDLE_UNSET\nis introduced to identify new connections. To make sure the events do not\ncontain this or another invalid handle HCI_CONN_HANDLE_MAX and checks\nare introduced.\n\nBuglink: https://bugzilla.kernel.org/show_bug.cgi?id=215497", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49138", "url": "https://www.suse.com/security/cve/CVE-2022-49138" }, { "category": "external", "summary": "SUSE Bug 1238160 for CVE-2022-49138", "url": "https://bugzilla.suse.com/1238160" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-49138" }, { "cve": "CVE-2022-49319", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49319" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/arm-smmu-v3: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49319", "url": "https://www.suse.com/security/cve/CVE-2022-49319" }, { "category": "external", "summary": "SUSE Bug 1238374 for CVE-2022-49319", "url": "https://bugzilla.suse.com/1238374" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-49319" }, { "cve": "CVE-2022-49323", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49323" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe()\n\nIt will cause null-ptr-deref when using \u0027res\u0027, if platform_get_resource()\nreturns NULL, so move using \u0027res\u0027 after devm_ioremap_resource() that\nwill check it to avoid null-ptr-deref.\nAnd use devm_platform_get_and_ioremap_resource() to simplify code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49323", "url": "https://www.suse.com/security/cve/CVE-2022-49323" }, { "category": "external", "summary": "SUSE Bug 1238400 for CVE-2022-49323", "url": "https://bugzilla.suse.com/1238400" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-49323" }, { "cve": "CVE-2022-49768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49768" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\n9p: trans_fd/p9_conn_cancel: drop client lock earlier\n\nsyzbot reported a double-lock here and we no longer need this\nlock after requests have been moved off to local list:\njust drop the lock earlier.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49768", "url": "https://www.suse.com/security/cve/CVE-2022-49768" }, { "category": "external", "summary": "SUSE Bug 1242446 for CVE-2022-49768", "url": "https://bugzilla.suse.com/1242446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-49768" }, { "cve": "CVE-2022-49825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49825" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nata: libata-transport: fix error handling in ata_tport_add()\n\nIn ata_tport_add(), the return value of transport_add_device() is\nnot checked. As a result, it causes null-ptr-deref while removing\nthe module, because transport_remove_device() is called to remove\nthe device that was not added.\n\nUnable to handle kernel NULL pointer dereference at virtual address 00000000000000d0\nCPU: 12 PID: 13605 Comm: rmmod Kdump: loaded Tainted: G W 6.1.0-rc3+ #8\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : device_del+0x48/0x39c\nlr : device_del+0x44/0x39c\nCall trace:\n device_del+0x48/0x39c\n attribute_container_class_device_del+0x28/0x40\n transport_remove_classdev+0x60/0x7c\n attribute_container_device_trigger+0x118/0x120\n transport_remove_device+0x20/0x30\n ata_tport_delete+0x34/0x60 [libata]\n ata_port_detach+0x148/0x1b0 [libata]\n ata_pci_remove_one+0x50/0x80 [libata]\n ahci_remove_one+0x4c/0x8c [ahci]\n\nFix this by checking and handling return value of transport_add_device()\nin ata_tport_add().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49825", "url": "https://www.suse.com/security/cve/CVE-2022-49825" }, { "category": "external", "summary": "SUSE Bug 1242548 for CVE-2022-49825", "url": "https://bugzilla.suse.com/1242548" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-49825" }, { "cve": "CVE-2022-49934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49934" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Fix UAF in ieee80211_scan_rx()\n\nieee80211_scan_rx() tries to access scan_req-\u003eflags after a\nnull check, but a UAF is observed when the scan is completed\nand __ieee80211_scan_completed() executes, which then calls\ncfg80211_scan_done() leading to the freeing of scan_req.\n\nSince scan_req is rcu_dereference()\u0027d, prevent the racing in\n__ieee80211_scan_completed() by ensuring that from mac80211\u0027s\nPOV it is no longer accessed from an RCU read critical section\nbefore we call cfg80211_scan_done().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49934", "url": "https://www.suse.com/security/cve/CVE-2022-49934" }, { "category": "external", "summary": "SUSE Bug 1245051 for CVE-2022-49934", "url": "https://bugzilla.suse.com/1245051" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-49934" }, { "cve": "CVE-2022-49948", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49948" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: Clear selection before changing the font\n\nWhen changing the console font with ioctl(KDFONTOP) the new font size\ncan be bigger than the previous font. A previous selection may thus now\nbe outside of the new screen size and thus trigger out-of-bounds\naccesses to graphics memory if the selection is removed in\nvc_do_resize().\n\nPrevent such out-of-memory accesses by dropping the selection before the\nvarious con_font_set() console handlers are called.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49948", "url": "https://www.suse.com/security/cve/CVE-2022-49948" }, { "category": "external", "summary": "SUSE Bug 1245058 for CVE-2022-49948", "url": "https://bugzilla.suse.com/1245058" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-49948" }, { "cve": "CVE-2022-49969", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49969" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: clear optc underflow before turn off odm clock\n\n[Why]\nAfter ODM clock off, optc underflow bit will be kept there always and clear not work.\nWe need to clear that before clock off.\n\n[How]\nClear that if have when clock off.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49969", "url": "https://www.suse.com/security/cve/CVE-2022-49969" }, { "category": "external", "summary": "SUSE Bug 1245060 for CVE-2022-49969", "url": "https://bugzilla.suse.com/1245060" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-49969" }, { "cve": "CVE-2022-49993", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49993" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nloop: Check for overflow while configuring loop\n\nThe userspace can configure a loop using an ioctl call, wherein\na configuration of type loop_config is passed (see lo_ioctl()\u0027s\ncase on line 1550 of drivers/block/loop.c). This proceeds to call\nloop_configure() which in turn calls loop_set_status_from_info()\n(see line 1050 of loop.c), passing \u0026config-\u003einfo which is of type\nloop_info64*. This function then sets the appropriate values, like\nthe offset.\n\nloop_device has lo_offset of type loff_t (see line 52 of loop.c),\nwhich is typdef-chained to long long, whereas loop_info64 has\nlo_offset of type __u64 (see line 56 of include/uapi/linux/loop.h).\n\nThe function directly copies offset from info to the device as\nfollows (See line 980 of loop.c):\n\tlo-\u003elo_offset = info-\u003elo_offset;\n\nThis results in an overflow, which triggers a warning in iomap_iter()\ndue to a call to iomap_iter_done() which has:\n\tWARN_ON_ONCE(iter-\u003eiomap.offset \u003e iter-\u003epos);\n\nThus, check for negative value during loop_set_status_from_info().\n\nBug report: https://syzkaller.appspot.com/bug?id=c620fe14aac810396d3c3edc9ad73848bf69a29e", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49993", "url": "https://www.suse.com/security/cve/CVE-2022-49993" }, { "category": "external", "summary": "SUSE Bug 1245121 for CVE-2022-49993", "url": "https://bugzilla.suse.com/1245121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-49993" }, { "cve": "CVE-2022-50025", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50025" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncxl: Fix a memory leak in an error handling path\n\nA bitmap_zalloc() must be balanced by a corresponding bitmap_free() in the\nerror handling path of afu_allocate_irqs().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50025", "url": "https://www.suse.com/security/cve/CVE-2022-50025" }, { "category": "external", "summary": "SUSE Bug 1245132 for CVE-2022-50025", "url": "https://bugzilla.suse.com/1245132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "low" } ], "title": "CVE-2022-50025" }, { "cve": "CVE-2022-50027", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50027" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix possible memory leak when failing to issue CMF WQE\n\nThere is no corresponding free routine if lpfc_sli4_issue_wqe fails to\nissue the CMF WQE in lpfc_issue_cmf_sync_wqe.\n\nIf ret_val is non-zero, then free the iocbq request structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50027", "url": "https://www.suse.com/security/cve/CVE-2022-50027" }, { "category": "external", "summary": "SUSE Bug 1245073 for CVE-2022-50027", "url": "https://bugzilla.suse.com/1245073" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-50027" }, { "cve": "CVE-2022-50030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50030" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input\n\nMalformed user input to debugfs results in buffer overflow crashes. Adapt\ninput string lengths to fit within internal buffers, leaving space for NULL\nterminators.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50030", "url": "https://www.suse.com/security/cve/CVE-2022-50030" }, { "category": "external", "summary": "SUSE Bug 1245265 for CVE-2022-50030", "url": "https://bugzilla.suse.com/1245265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-50030" }, { "cve": "CVE-2022-50033", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50033" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-ppc-of: Fix refcount leak bug\n\nIn ohci_hcd_ppc_of_probe(), of_find_compatible_node() will return\na node pointer with refcount incremented. We should use of_node_put()\nwhen it is not used anymore.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50033", "url": "https://www.suse.com/security/cve/CVE-2022-50033" }, { "category": "external", "summary": "SUSE Bug 1245139 for CVE-2022-50033", "url": "https://bugzilla.suse.com/1245139" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-50033" }, { "cve": "CVE-2022-50103", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50103" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched, cpuset: Fix dl_cpu_busy() panic due to empty cs-\u003ecpus_allowed\n\nWith cgroup v2, the cpuset\u0027s cpus_allowed mask can be empty indicating\nthat the cpuset will just use the effective CPUs of its parent. So\ncpuset_can_attach() can call task_can_attach() with an empty mask.\nThis can lead to cpumask_any_and() returns nr_cpu_ids causing the call\nto dl_bw_of() to crash due to percpu value access of an out of bound\nCPU value. For example:\n\n\t[80468.182258] BUG: unable to handle page fault for address: ffffffff8b6648b0\n\t :\n\t[80468.191019] RIP: 0010:dl_cpu_busy+0x30/0x2b0\n\t :\n\t[80468.207946] Call Trace:\n\t[80468.208947] cpuset_can_attach+0xa0/0x140\n\t[80468.209953] cgroup_migrate_execute+0x8c/0x490\n\t[80468.210931] cgroup_update_dfl_csses+0x254/0x270\n\t[80468.211898] cgroup_subtree_control_write+0x322/0x400\n\t[80468.212854] kernfs_fop_write_iter+0x11c/0x1b0\n\t[80468.213777] new_sync_write+0x11f/0x1b0\n\t[80468.214689] vfs_write+0x1eb/0x280\n\t[80468.215592] ksys_write+0x5f/0xe0\n\t[80468.216463] do_syscall_64+0x5c/0x80\n\t[80468.224287] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nFix that by using effective_cpus instead. For cgroup v1, effective_cpus\nis the same as cpus_allowed. For v2, effective_cpus is the real cpumask\nto be used by tasks within the cpuset anyway.\n\nAlso update task_can_attach()\u0027s 2nd argument name to cs_effective_cpus to\nreflect the change. In addition, a check is added to task_can_attach()\nto guard against the possibility that cpumask_any_and() may return a\nvalue \u003e= nr_cpu_ids.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50103", "url": "https://www.suse.com/security/cve/CVE-2022-50103" }, { "category": "external", "summary": "SUSE Bug 1244840 for CVE-2022-50103", "url": "https://bugzilla.suse.com/1244840" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-50103" }, { "cve": "CVE-2022-50149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50149" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: fix potential deadlock in __driver_attach\n\nIn __driver_attach function, There are also AA deadlock problem,\nlike the commit b232b02bf3c2 (\"driver core: fix deadlock in\n__device_attach\").\n\nstack like commit b232b02bf3c2 (\"driver core: fix deadlock in\n__device_attach\").\nlist below:\n In __driver_attach function, The lock holding logic is as follows:\n ...\n __driver_attach\n if (driver_allows_async_probing(drv))\n device_lock(dev) // get lock dev\n async_schedule_dev(__driver_attach_async_helper, dev); // func\n async_schedule_node\n async_schedule_node_domain(func)\n entry = kzalloc(sizeof(struct async_entry), GFP_ATOMIC);\n /* when fail or work limit, sync to execute func, but\n __driver_attach_async_helper will get lock dev as\n will, which will lead to A-A deadlock. */\n if (!entry || atomic_read(\u0026entry_count) \u003e MAX_WORK) {\n func;\n else\n queue_work_node(node, system_unbound_wq, \u0026entry-\u003ework)\n device_unlock(dev)\n\n As above show, when it is allowed to do async probes, because of\n out of memory or work limit, async work is not be allowed, to do\n sync execute instead. it will lead to A-A deadlock because of\n __driver_attach_async_helper getting lock dev.\n\nReproduce:\nand it can be reproduce by make the condition\n(if (!entry || atomic_read(\u0026entry_count) \u003e MAX_WORK)) untenable, like\nbelow:\n\n[ 370.785650] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables\nthis message.\n[ 370.787154] task:swapper/0 state:D stack: 0 pid: 1 ppid:\n0 flags:0x00004000\n[ 370.788865] Call Trace:\n[ 370.789374] \u003cTASK\u003e\n[ 370.789841] __schedule+0x482/0x1050\n[ 370.790613] schedule+0x92/0x1a0\n[ 370.791290] schedule_preempt_disabled+0x2c/0x50\n[ 370.792256] __mutex_lock.isra.0+0x757/0xec0\n[ 370.793158] __mutex_lock_slowpath+0x1f/0x30\n[ 370.794079] mutex_lock+0x50/0x60\n[ 370.794795] __device_driver_lock+0x2f/0x70\n[ 370.795677] ? driver_probe_device+0xd0/0xd0\n[ 370.796576] __driver_attach_async_helper+0x1d/0xd0\n[ 370.797318] ? driver_probe_device+0xd0/0xd0\n[ 370.797957] async_schedule_node_domain+0xa5/0xc0\n[ 370.798652] async_schedule_node+0x19/0x30\n[ 370.799243] __driver_attach+0x246/0x290\n[ 370.799828] ? driver_allows_async_probing+0xa0/0xa0\n[ 370.800548] bus_for_each_dev+0x9d/0x130\n[ 370.801132] driver_attach+0x22/0x30\n[ 370.801666] bus_add_driver+0x290/0x340\n[ 370.802246] driver_register+0x88/0x140\n[ 370.802817] ? virtio_scsi_init+0x116/0x116\n[ 370.803425] scsi_register_driver+0x1a/0x30\n[ 370.804057] init_sd+0x184/0x226\n[ 370.804533] do_one_initcall+0x71/0x3a0\n[ 370.805107] kernel_init_freeable+0x39a/0x43a\n[ 370.805759] ? rest_init+0x150/0x150\n[ 370.806283] kernel_init+0x26/0x230\n[ 370.806799] ret_from_fork+0x1f/0x30\n\nTo fix the deadlock, move the async_schedule_dev outside device_lock,\nas we can see, in async_schedule_node_domain, the parameter of\nqueue_work_node is system_unbound_wq, so it can accept concurrent\noperations. which will also not change the code logic, and will\nnot lead to deadlock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50149", "url": "https://www.suse.com/security/cve/CVE-2022-50149" }, { "category": "external", "summary": "SUSE Bug 1244883 for CVE-2022-50149", "url": "https://bugzilla.suse.com/1244883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-50149" }, { "cve": "CVE-2022-50226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50226" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak\n\nFor some sev ioctl interfaces, input may be passed that is less than or\nequal to SEV_FW_BLOB_MAX_SIZE, but larger than the data that PSP\nfirmware returns. In this case, kmalloc will allocate memory that is the\nsize of the input rather than the size of the data. Since PSP firmware\ndoesn\u0027t fully overwrite the buffer, the sev ioctl interfaces with the\nissue may return uninitialized slab memory.\n\nCurrently, all of the ioctl interfaces in the ccp driver are safe, but\nto prevent future problems, change all ioctl interfaces that allocate\nmemory with kmalloc to use kzalloc and memset the data buffer to zero\nin sev_ioctl_do_platform_status.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50226", "url": "https://www.suse.com/security/cve/CVE-2022-50226" }, { "category": "external", "summary": "SUSE Bug 1244860 for CVE-2022-50226", "url": "https://bugzilla.suse.com/1244860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2022-50226" }, { "cve": "CVE-2023-2176", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2176" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2176", "url": "https://www.suse.com/security/cve/CVE-2023-2176" }, { "category": "external", "summary": "SUSE Bug 1210629 for CVE-2023-2176", "url": "https://bugzilla.suse.com/1210629" }, { "category": "external", "summary": "SUSE Bug 1210630 for CVE-2023-2176", "url": "https://bugzilla.suse.com/1210630" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-2176", "url": "https://bugzilla.suse.com/1213842" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "important" } ], "title": "CVE-2023-2176" }, { "cve": "CVE-2023-52878", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52878" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: dev: can_put_echo_skb(): don\u0027t crash kernel if can_priv::echo_skb is accessed out of bounds\n\nIf the \"struct can_priv::echoo_skb\" is accessed out of bounds, this\nwould cause a kernel crash. Instead, issue a meaningful warning\nmessage and return with an error.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52878", "url": "https://www.suse.com/security/cve/CVE-2023-52878" }, { "category": "external", "summary": "SUSE Bug 1225000 for CVE-2023-52878", "url": "https://bugzilla.suse.com/1225000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2023-52878" }, { "cve": "CVE-2023-53020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-53020" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: close all race conditions in l2tp_tunnel_register()\n\nThe code in l2tp_tunnel_register() is racy in several ways:\n\n1. It modifies the tunnel socket _after_ publishing it.\n\n2. It calls setup_udp_tunnel_sock() on an existing socket without\n locking.\n\n3. It changes sock lock class on fly, which triggers many syzbot\n reports.\n\nThis patch amends all of them by moving socket initialization code\nbefore publishing and under sock lock. As suggested by Jakub, the\nl2tp lockdep class is not necessary as we can just switch to\nbh_lock_sock_nested().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-53020", "url": "https://www.suse.com/security/cve/CVE-2023-53020" }, { "category": "external", "summary": "SUSE Bug 1240224 for CVE-2023-53020", "url": "https://bugzilla.suse.com/1240224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2023-53020" }, { "cve": "CVE-2023-53117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-53117" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: prevent out-of-bounds array speculation when closing a file descriptor\n\nGoogle-Bug-Id: 114199369", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-53117", "url": "https://www.suse.com/security/cve/CVE-2023-53117" }, { "category": "external", "summary": "SUSE Bug 1242780 for CVE-2023-53117", "url": "https://bugzilla.suse.com/1242780" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2023-53117" }, { "cve": "CVE-2023-53118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-53118" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix a procfs host directory removal regression\n\nscsi_proc_hostdir_rm() decreases a reference counter and hence must only be\ncalled once per host that is removed. This change does not require a\nscsi_add_host_with_dma() change since scsi_add_host_with_dma() will return\n0 (success) if scsi_proc_host_add() is called.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-53118", "url": "https://www.suse.com/security/cve/CVE-2023-53118" }, { "category": "external", "summary": "SUSE Bug 1242365 for CVE-2023-53118", "url": "https://bugzilla.suse.com/1242365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2023-53118" }, { "cve": "CVE-2024-26974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-26974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - resolve race condition during AER recovery\n\nDuring the PCI AER system\u0027s error recovery process, the kernel driver\nmay encounter a race condition with freeing the reset_data structure\u0027s\nmemory. If the device restart will take more than 10 seconds the function\nscheduling that restart will exit due to a timeout, and the reset_data\nstructure will be freed. However, this data structure is used for\ncompletion notification after the restart is completed, which leads\nto a UAF bug.\n\nThis results in a KFENCE bug notice.\n\n BUG: KFENCE: use-after-free read in adf_device_reset_worker+0x38/0xa0 [intel_qat]\n Use-after-free read at 0x00000000bc56fddf (in kfence-#142):\n adf_device_reset_worker+0x38/0xa0 [intel_qat]\n process_one_work+0x173/0x340\n\nTo resolve this race condition, the memory associated to the container\nof the work_struct is freed on the worker if the timeout expired,\notherwise on the function that schedules the worker.\nThe timeout detection can be done by checking if the caller is\nstill waiting for completion or not by using completion_done() function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-26974", "url": "https://www.suse.com/security/cve/CVE-2024-26974" }, { "category": "external", "summary": "SUSE Bug 1223638 for CVE-2024-26974", "url": "https://bugzilla.suse.com/1223638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2024-26974" }, { "cve": "CVE-2024-26982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-26982" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: check the inode number is not the invalid value of zero\n\nSyskiller has produced an out of bounds access in fill_meta_index().\n\nThat out of bounds access is ultimately caused because the inode\nhas an inode number with the invalid value of zero, which was not checked.\n\nThe reason this causes the out of bounds access is due to following\nsequence of events:\n\n1. Fill_meta_index() is called to allocate (via empty_meta_index())\n and fill a metadata index. It however suffers a data read error\n and aborts, invalidating the newly returned empty metadata index.\n It does this by setting the inode number of the index to zero,\n which means unused (zero is not a valid inode number).\n\n2. When fill_meta_index() is subsequently called again on another\n read operation, locate_meta_index() returns the previous index\n because it matches the inode number of 0. Because this index\n has been returned it is expected to have been filled, and because\n it hasn\u0027t been, an out of bounds access is performed.\n\nThis patch adds a sanity check which checks that the inode number\nis not zero when the inode is created and returns -EINVAL if it is.\n\n[phillip@squashfs.org.uk: whitespace fix]", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-26982", "url": "https://www.suse.com/security/cve/CVE-2024-26982" }, { "category": "external", "summary": "SUSE Bug 1223634 for CVE-2024-26982", "url": "https://bugzilla.suse.com/1223634" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2024-26982" }, { "cve": "CVE-2024-44963", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-44963" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not BUG_ON() when freeing tree block after error\n\nWhen freeing a tree block, at btrfs_free_tree_block(), if we fail to\ncreate a delayed reference we don\u0027t deal with the error and just do a\nBUG_ON(). The error most likely to happen is -ENOMEM, and we have a\ncomment mentioning that only -ENOMEM can happen, but that is not true,\nbecause in case qgroups are enabled any error returned from\nbtrfs_qgroup_trace_extent_post() (can be -EUCLEAN or anything returned\nfrom btrfs_search_slot() for example) can be propagated back to\nbtrfs_free_tree_block().\n\nSo stop doing a BUG_ON() and return the error to the callers and make\nthem abort the transaction to prevent leaking space. Syzbot was\ntriggering this, likely due to memory allocation failure injection.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-44963", "url": "https://www.suse.com/security/cve/CVE-2024-44963" }, { "category": "external", "summary": "SUSE Bug 1230216 for CVE-2024-44963", "url": "https://bugzilla.suse.com/1230216" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2024-44963" }, { "cve": "CVE-2024-46713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-46713" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/aux: Fix AUX buffer serialization\n\nOle reported that event-\u003emmap_mutex is strictly insufficient to\nserialize the AUX buffer, add a per RB mutex to fully serialize it.\n\nNote that in the lock order comment the perf_event::mmap_mutex order\nwas already wrong, that is, it nesting under mmap_lock is not new with\nthis patch.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-46713", "url": "https://www.suse.com/security/cve/CVE-2024-46713" }, { "category": "external", "summary": "SUSE Bug 1230581 for CVE-2024-46713", "url": "https://bugzilla.suse.com/1230581" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2024-46713" }, { "cve": "CVE-2024-49861", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-49861" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix helper writes to read-only maps\n\nLonial found an issue that despite user- and BPF-side frozen BPF map\n(like in case of .rodata), it was still possible to write into it from\na BPF program side through specific helpers having ARG_PTR_TO_{LONG,INT}\nas arguments.\n\nIn check_func_arg() when the argument is as mentioned, the meta-\u003eraw_mode\nis never set. Later, check_helper_mem_access(), under the case of\nPTR_TO_MAP_VALUE as register base type, it assumes BPF_READ for the\nsubsequent call to check_map_access_type() and given the BPF map is\nread-only it succeeds.\n\nThe helpers really need to be annotated as ARG_PTR_TO_{LONG,INT} | MEM_UNINIT\nwhen results are written into them as opposed to read out of them. The\nlatter indicates that it\u0027s okay to pass a pointer to uninitialized memory\nas the memory is written to anyway.\n\nHowever, ARG_PTR_TO_{LONG,INT} is a special case of ARG_PTR_TO_FIXED_SIZE_MEM\njust with additional alignment requirement. So it is better to just get\nrid of the ARG_PTR_TO_{LONG,INT} special cases altogether and reuse the\nfixed size memory types. For this, add MEM_ALIGNED to additionally ensure\nalignment given these helpers write directly into the args via *\u003cptr\u003e = val.\nThe .arg*_size has been initialized reflecting the actual sizeof(*\u003cptr\u003e).\n\nMEM_ALIGNED can only be used in combination with MEM_FIXED_SIZE annotated\nargument types, since in !MEM_FIXED_SIZE cases the verifier does not know\nthe buffer size a priori and therefore cannot blindly write *\u003cptr\u003e = val.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-49861", "url": "https://www.suse.com/security/cve/CVE-2024-49861" }, { "category": "external", "summary": "SUSE Bug 1232254 for CVE-2024-49861", "url": "https://bugzilla.suse.com/1232254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2024-49861" }, { "cve": "CVE-2025-21731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-21731" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: don\u0027t allow reconnect after disconnect\n\nFollowing process can cause nbd_config UAF:\n\n1) grab nbd_config temporarily;\n\n2) nbd_genl_disconnect() flush all recv_work() and release the\ninitial reference:\n\n nbd_genl_disconnect\n nbd_disconnect_and_put\n nbd_disconnect\n flush_workqueue(nbd-\u003erecv_workq)\n if (test_and_clear_bit(NBD_RT_HAS_CONFIG_REF, ...))\n nbd_config_put\n -\u003e due to step 1), reference is still not zero\n\n3) nbd_genl_reconfigure() queue recv_work() again;\n\n nbd_genl_reconfigure\n config = nbd_get_config_unlocked(nbd)\n if (!config)\n -\u003e succeed\n if (!test_bit(NBD_RT_BOUND, ...))\n -\u003e succeed\n nbd_reconnect_socket\n queue_work(nbd-\u003erecv_workq, \u0026args-\u003ework)\n\n4) step 1) release the reference;\n\n5) Finially, recv_work() will trigger UAF:\n\n recv_work\n nbd_config_put(nbd)\n -\u003e nbd_config is freed\n atomic_dec(\u0026config-\u003erecv_threads)\n -\u003e UAF\n\nFix the problem by clearing NBD_RT_BOUND in nbd_genl_disconnect(), so\nthat nbd_genl_reconfigure() will fail.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-21731", "url": "https://www.suse.com/security/cve/CVE-2025-21731" }, { "category": "external", "summary": "SUSE Bug 1237881 for CVE-2025-21731", "url": "https://bugzilla.suse.com/1237881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-21731" }, { "cve": "CVE-2025-21928", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-21928" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()\n\nThe system can experience a random crash a few minutes after the driver is\nremoved. This issue occurs due to improper handling of memory freeing in\nthe ishtp_hid_remove() function.\n\nThe function currently frees the `driver_data` directly within the loop\nthat destroys the HID devices, which can lead to accessing freed memory.\nSpecifically, `hid_destroy_device()` uses `driver_data` when it calls\n`hid_ishtp_set_feature()` to power off the sensor, so freeing\n`driver_data` beforehand can result in accessing invalid memory.\n\nThis patch resolves the issue by storing the `driver_data` in a temporary\nvariable before calling `hid_destroy_device()`, and then freeing the\n`driver_data` after the device is destroyed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-21928", "url": "https://www.suse.com/security/cve/CVE-2025-21928" }, { "category": "external", "summary": "SUSE Bug 1240722 for CVE-2025-21928", "url": "https://bugzilla.suse.com/1240722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-21928" }, { "cve": "CVE-2025-23163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23163" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: vlan: don\u0027t propagate flags on open\n\nWith the device instance lock, there is now a possibility of a deadlock:\n\n[ 1.211455] ============================================\n[ 1.211571] WARNING: possible recursive locking detected\n[ 1.211687] 6.14.0-rc5-01215-g032756b4ca7a-dirty #5 Not tainted\n[ 1.211823] --------------------------------------------\n[ 1.211936] ip/184 is trying to acquire lock:\n[ 1.212032] ffff8881024a4c30 (\u0026dev-\u003elock){+.+.}-{4:4}, at: dev_set_allmulti+0x4e/0xb0\n[ 1.212207]\n[ 1.212207] but task is already holding lock:\n[ 1.212332] ffff8881024a4c30 (\u0026dev-\u003elock){+.+.}-{4:4}, at: dev_open+0x50/0xb0\n[ 1.212487]\n[ 1.212487] other info that might help us debug this:\n[ 1.212626] Possible unsafe locking scenario:\n[ 1.212626]\n[ 1.212751] CPU0\n[ 1.212815] ----\n[ 1.212871] lock(\u0026dev-\u003elock);\n[ 1.212944] lock(\u0026dev-\u003elock);\n[ 1.213016]\n[ 1.213016] *** DEADLOCK ***\n[ 1.213016]\n[ 1.213143] May be due to missing lock nesting notation\n[ 1.213143]\n[ 1.213294] 3 locks held by ip/184:\n[ 1.213371] #0: ffffffff838b53e0 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_nets_lock+0x1b/0xa0\n[ 1.213543] #1: ffffffff84e5fc70 (\u0026net-\u003ertnl_mutex){+.+.}-{4:4}, at: rtnl_nets_lock+0x37/0xa0\n[ 1.213727] #2: ffff8881024a4c30 (\u0026dev-\u003elock){+.+.}-{4:4}, at: dev_open+0x50/0xb0\n[ 1.213895]\n[ 1.213895] stack backtrace:\n[ 1.213991] CPU: 0 UID: 0 PID: 184 Comm: ip Not tainted 6.14.0-rc5-01215-g032756b4ca7a-dirty #5\n[ 1.213993] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\n[ 1.213994] Call Trace:\n[ 1.213995] \u003cTASK\u003e\n[ 1.213996] dump_stack_lvl+0x8e/0xd0\n[ 1.214000] print_deadlock_bug+0x28b/0x2a0\n[ 1.214020] lock_acquire+0xea/0x2a0\n[ 1.214027] __mutex_lock+0xbf/0xd40\n[ 1.214038] dev_set_allmulti+0x4e/0xb0 # real_dev-\u003eflags \u0026 IFF_ALLMULTI\n[ 1.214040] vlan_dev_open+0xa5/0x170 # ndo_open on vlandev\n[ 1.214042] __dev_open+0x145/0x270\n[ 1.214046] __dev_change_flags+0xb0/0x1e0\n[ 1.214051] netif_change_flags+0x22/0x60 # IFF_UP vlandev\n[ 1.214053] dev_change_flags+0x61/0xb0 # for each device in group from dev-\u003evlan_info\n[ 1.214055] vlan_device_event+0x766/0x7c0 # on netdevsim0\n[ 1.214058] notifier_call_chain+0x78/0x120\n[ 1.214062] netif_open+0x6d/0x90\n[ 1.214064] dev_open+0x5b/0xb0 # locks netdevsim0\n[ 1.214066] bond_enslave+0x64c/0x1230\n[ 1.214075] do_set_master+0x175/0x1e0 # on netdevsim0\n[ 1.214077] do_setlink+0x516/0x13b0\n[ 1.214094] rtnl_newlink+0xaba/0xb80\n[ 1.214132] rtnetlink_rcv_msg+0x440/0x490\n[ 1.214144] netlink_rcv_skb+0xeb/0x120\n[ 1.214150] netlink_unicast+0x1f9/0x320\n[ 1.214153] netlink_sendmsg+0x346/0x3f0\n[ 1.214157] __sock_sendmsg+0x86/0xb0\n[ 1.214160] ____sys_sendmsg+0x1c8/0x220\n[ 1.214164] ___sys_sendmsg+0x28f/0x2d0\n[ 1.214179] __x64_sys_sendmsg+0xef/0x140\n[ 1.214184] do_syscall_64+0xec/0x1d0\n[ 1.214190] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 1.214191] RIP: 0033:0x7f2d1b4a7e56\n\nDevice setup:\n\n netdevsim0 (down)\n ^ ^\n bond netdevsim1.100@netdevsim1 allmulticast=on (down)\n\nWhen we enslave the lower device (netdevsim0) which has a vlan, we\npropagate vlan\u0027s allmuti/promisc flags during ndo_open. This causes\n(re)locking on of the real_dev.\n\nPropagate allmulti/promisc on flags change, not on the open. There\nis a slight semantics change that vlans that are down now propagate\nthe flags, but this seems unlikely to result in the real issues.\n\nReproducer:\n\n echo 0 1 \u003e /sys/bus/netdevsim/new_device\n\n dev_path=$(ls -d /sys/bus/netdevsim/devices/netdevsim0/net/*)\n dev=$(echo $dev_path | rev | cut -d/ -f1 | rev)\n\n ip link set dev $dev name netdevsim0\n ip link set dev netdevsim0 up\n\n ip link add link netdevsim0 name netdevsim0.100 type vlan id 100\n ip link set dev netdevsim0.100 allm\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23163", "url": "https://www.suse.com/security/cve/CVE-2025-23163" }, { "category": "external", "summary": "SUSE Bug 1242837 for CVE-2025-23163", "url": "https://bugzilla.suse.com/1242837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-23163" }, { "cve": "CVE-2025-37798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37798" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncodel: remove sch-\u003eq.qlen check before qdisc_tree_reduce_backlog()\n\nAfter making all -\u003eqlen_notify() callbacks idempotent, now it is safe to\nremove the check of qlen!=0 from both fq_codel_dequeue() and\ncodel_qdisc_dequeue().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37798", "url": "https://www.suse.com/security/cve/CVE-2025-37798" }, { "category": "external", "summary": "SUSE Bug 1242414 for CVE-2025-37798", "url": "https://bugzilla.suse.com/1242414" }, { "category": "external", "summary": "SUSE Bug 1242417 for CVE-2025-37798", "url": "https://bugzilla.suse.com/1242417" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "important" } ], "title": "CVE-2025-37798" }, { "cve": "CVE-2025-37856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37856" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: harden block_group::bg_list against list_del() races\n\nAs far as I can tell, these calls of list_del_init() on bg_list cannot\nrun concurrently with btrfs_mark_bg_unused() or btrfs_mark_bg_to_reclaim(),\nas they are in transaction error paths and situations where the block\ngroup is readonly.\n\nHowever, if there is any chance at all of racing with mark_bg_unused(),\nor a different future user of bg_list, better to be safe than sorry.\n\nOtherwise we risk the following interleaving (bg_list refcount in parens)\n\nT1 (some random op) T2 (btrfs_mark_bg_unused)\n !list_empty(\u0026bg-\u003ebg_list); (1)\nlist_del_init(\u0026bg-\u003ebg_list); (1)\n list_move_tail (1)\nbtrfs_put_block_group (0)\n btrfs_delete_unused_bgs\n bg = list_first_entry\n list_del_init(\u0026bg-\u003ebg_list);\n btrfs_put_block_group(bg); (-1)\n\nUltimately, this results in a broken ref count that hits zero one deref\nearly and the real final deref underflows the refcount, resulting in a WARNING.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37856", "url": "https://www.suse.com/security/cve/CVE-2025-37856" }, { "category": "external", "summary": "SUSE Bug 1243068 for CVE-2025-37856", "url": "https://bugzilla.suse.com/1243068" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-37856" }, { "cve": "CVE-2025-37885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37885" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Reset IRTE to host control if *new* route isn\u0027t postable\n\nRestore an IRTE back to host control (remapped or posted MSI mode) if the\n*new* GSI route prevents posting the IRQ directly to a vCPU, regardless of\nthe GSI routing type. Updating the IRTE if and only if the new GSI is an\nMSI results in KVM leaving an IRTE posting to a vCPU.\n\nThe dangling IRTE can result in interrupts being incorrectly delivered to\nthe guest, and in the worst case scenario can result in use-after-free,\ne.g. if the VM is torn down, but the underlying host IRQ isn\u0027t freed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37885", "url": "https://www.suse.com/security/cve/CVE-2025-37885" }, { "category": "external", "summary": "SUSE Bug 1242960 for CVE-2025-37885", "url": "https://bugzilla.suse.com/1242960" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-37885" }, { "cve": "CVE-2025-37920", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37920" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Fix race condition in AF_XDP generic RX path\n\nMove rx_lock from xsk_socket to xsk_buff_pool.\nFix synchronization for shared umem mode in\ngeneric RX path where multiple sockets share\nsingle xsk_buff_pool.\n\nRX queue is exclusive to xsk_socket, while FILL\nqueue can be shared between multiple sockets.\nThis could result in race condition where two\nCPU cores access RX path of two different sockets\nsharing the same umem.\n\nProtect both queues by acquiring spinlock in shared\nxsk_buff_pool.\n\nLock contention may be minimized in the future by some\nper-thread FQ buffering.\n\nIt\u0027s safe and necessary to move spin_lock_bh(rx_lock)\nafter xsk_rcv_check():\n* xs-\u003epool and spinlock_init is synchronized by\n xsk_bind() -\u003e xsk_is_bound() memory barriers.\n* xsk_rcv_check() may return true at the moment\n of xsk_release() or xsk_unbind_dev(),\n however this will not cause any data races or\n race conditions. xsk_unbind_dev() removes xdp\n socket from all maps and waits for completion\n of all outstanding rx operations. Packets in\n RX path will either complete safely or drop.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37920", "url": "https://www.suse.com/security/cve/CVE-2025-37920" }, { "category": "external", "summary": "SUSE Bug 1243479 for CVE-2025-37920", "url": "https://bugzilla.suse.com/1243479" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-37920" }, { "cve": "CVE-2025-38034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38034" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref\n\nbtrfs_prelim_ref() calls the old and new reference variables in the\nincorrect order. This causes a NULL pointer dereference because oldref\nis passed as NULL to trace_btrfs_prelim_ref_insert().\n\nNote, trace_btrfs_prelim_ref_insert() is being called with newref as\noldref (and oldref as NULL) on purpose in order to print out\nthe values of newref.\n\nTo reproduce:\necho 1 \u003e /sys/kernel/debug/tracing/events/btrfs/btrfs_prelim_ref_insert/enable\n\nPerform some writeback operations.\n\nBacktrace:\nBUG: kernel NULL pointer dereference, address: 0000000000000018\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 115949067 P4D 115949067 PUD 11594a067 PMD 0\n Oops: Oops: 0000 [#1] SMP NOPTI\n CPU: 1 UID: 0 PID: 1188 Comm: fsstress Not tainted 6.15.0-rc2-tester+ #47 PREEMPT(voluntary) 7ca2cef72d5e9c600f0c7718adb6462de8149622\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org 04/01/2014\n RIP: 0010:trace_event_raw_event_btrfs__prelim_ref+0x72/0x130\n Code: e8 43 81 9f ff 48 85 c0 74 78 4d 85 e4 0f 84 8f 00 00 00 49 8b 94 24 c0 06 00 00 48 8b 0a 48 89 48 08 48 8b 52 08 48 89 50 10 \u003c49\u003e 8b 55 18 48 89 50 18 49 8b 55 20 48 89 50 20 41 0f b6 55 28 88\n RSP: 0018:ffffce44820077a0 EFLAGS: 00010286\n RAX: ffff8c6b403f9014 RBX: ffff8c6b55825730 RCX: 304994edf9cf506b\n RDX: d8b11eb7f0fdb699 RSI: ffff8c6b403f9010 RDI: ffff8c6b403f9010\n RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000010\n R10: 00000000ffffffff R11: 0000000000000000 R12: ffff8c6b4e8fb000\n R13: 0000000000000000 R14: ffffce44820077a8 R15: ffff8c6b4abd1540\n FS: 00007f4dc6813740(0000) GS:ffff8c6c1d378000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000018 CR3: 000000010eb42000 CR4: 0000000000750ef0\n PKRU: 55555554\n Call Trace:\n \u003cTASK\u003e\n prelim_ref_insert+0x1c1/0x270\n find_parent_nodes+0x12a6/0x1ee0\n ? __entry_text_end+0x101f06/0x101f09\n ? srso_alias_return_thunk+0x5/0xfbef5\n ? srso_alias_return_thunk+0x5/0xfbef5\n ? srso_alias_return_thunk+0x5/0xfbef5\n ? srso_alias_return_thunk+0x5/0xfbef5\n btrfs_is_data_extent_shared+0x167/0x640\n ? fiemap_process_hole+0xd0/0x2c0\n extent_fiemap+0xa5c/0xbc0\n ? __entry_text_end+0x101f05/0x101f09\n btrfs_fiemap+0x7e/0xd0\n do_vfs_ioctl+0x425/0x9d0\n __x64_sys_ioctl+0x75/0xc0", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38034", "url": "https://www.suse.com/security/cve/CVE-2025-38034" }, { "category": "external", "summary": "SUSE Bug 1244792 for CVE-2025-38034", "url": "https://bugzilla.suse.com/1244792" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38034" }, { "cve": "CVE-2025-38035", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38035" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: don\u0027t restore null sk_state_change\n\nqueue-\u003estate_change is set as part of nvmet_tcp_set_queue_sock(), but if\nthe TCP connection isn\u0027t established when nvmet_tcp_set_queue_sock() is\ncalled then queue-\u003estate_change isn\u0027t set and sock-\u003esk-\u003esk_state_change\nisn\u0027t replaced.\n\nAs such we don\u0027t need to restore sock-\u003esk-\u003esk_state_change if\nqueue-\u003estate_change is NULL.\n\nThis avoids NULL pointer dereferences such as this:\n\n[ 286.462026][ C0] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[ 286.462814][ C0] #PF: supervisor instruction fetch in kernel mode\n[ 286.463796][ C0] #PF: error_code(0x0010) - not-present page\n[ 286.464392][ C0] PGD 8000000140620067 P4D 8000000140620067 PUD 114201067 PMD 0\n[ 286.465086][ C0] Oops: Oops: 0010 [#1] SMP KASAN PTI\n[ 286.465559][ C0] CPU: 0 UID: 0 PID: 1628 Comm: nvme Not tainted 6.15.0-rc2+ #11 PREEMPT(voluntary)\n[ 286.466393][ C0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014\n[ 286.467147][ C0] RIP: 0010:0x0\n[ 286.467420][ C0] Code: Unable to access opcode bytes at 0xffffffffffffffd6.\n[ 286.467977][ C0] RSP: 0018:ffff8883ae008580 EFLAGS: 00010246\n[ 286.468425][ C0] RAX: 0000000000000000 RBX: ffff88813fd34100 RCX: ffffffffa386cc43\n[ 286.469019][ C0] RDX: 1ffff11027fa68b6 RSI: 0000000000000008 RDI: ffff88813fd34100\n[ 286.469545][ C0] RBP: ffff88813fd34160 R08: 0000000000000000 R09: ffffed1027fa682c\n[ 286.470072][ C0] R10: ffff88813fd34167 R11: 0000000000000000 R12: ffff88813fd344c3\n[ 286.470585][ C0] R13: ffff88813fd34112 R14: ffff88813fd34aec R15: ffff888132cdd268\n[ 286.471070][ C0] FS: 00007fe3c04c7d80(0000) GS:ffff88840743f000(0000) knlGS:0000000000000000\n[ 286.471644][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 286.472543][ C0] CR2: ffffffffffffffd6 CR3: 000000012daca000 CR4: 00000000000006f0\n[ 286.473500][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 286.474467][ C0] DR3: 0000000000000000 DR6: 00000000ffff07f0 DR7: 0000000000000400\n[ 286.475453][ C0] Call Trace:\n[ 286.476102][ C0] \u003cIRQ\u003e\n[ 286.476719][ C0] tcp_fin+0x2bb/0x440\n[ 286.477429][ C0] tcp_data_queue+0x190f/0x4e60\n[ 286.478174][ C0] ? __build_skb_around+0x234/0x330\n[ 286.478940][ C0] ? rcu_is_watching+0x11/0xb0\n[ 286.479659][ C0] ? __pfx_tcp_data_queue+0x10/0x10\n[ 286.480431][ C0] ? tcp_try_undo_loss+0x640/0x6c0\n[ 286.481196][ C0] ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90\n[ 286.482046][ C0] ? kvm_clock_get_cycles+0x14/0x30\n[ 286.482769][ C0] ? ktime_get+0x66/0x150\n[ 286.483433][ C0] ? rcu_is_watching+0x11/0xb0\n[ 286.484146][ C0] tcp_rcv_established+0x6e4/0x2050\n[ 286.484857][ C0] ? rcu_is_watching+0x11/0xb0\n[ 286.485523][ C0] ? ipv4_dst_check+0x160/0x2b0\n[ 286.486203][ C0] ? __pfx_tcp_rcv_established+0x10/0x10\n[ 286.486917][ C0] ? lock_release+0x217/0x2c0\n[ 286.487595][ C0] tcp_v4_do_rcv+0x4d6/0x9b0\n[ 286.488279][ C0] tcp_v4_rcv+0x2af8/0x3e30\n[ 286.488904][ C0] ? raw_local_deliver+0x51b/0xad0\n[ 286.489551][ C0] ? rcu_is_watching+0x11/0xb0\n[ 286.490198][ C0] ? __pfx_tcp_v4_rcv+0x10/0x10\n[ 286.490813][ C0] ? __pfx_raw_local_deliver+0x10/0x10\n[ 286.491487][ C0] ? __pfx_nf_confirm+0x10/0x10 [nf_conntrack]\n[ 286.492275][ C0] ? rcu_is_watching+0x11/0xb0\n[ 286.492900][ C0] ip_protocol_deliver_rcu+0x8f/0x370\n[ 286.493579][ C0] ip_local_deliver_finish+0x297/0x420\n[ 286.494268][ C0] ip_local_deliver+0x168/0x430\n[ 286.494867][ C0] ? __pfx_ip_local_deliver+0x10/0x10\n[ 286.495498][ C0] ? __pfx_ip_local_deliver_finish+0x10/0x10\n[ 286.496204][ C0] ? ip_rcv_finish_core+0x19a/0x1f20\n[ 286.496806][ C0] ? lock_release+0x217/0x2c0\n[ 286.497414][ C0] ip_rcv+0x455/0x6e0\n[ 286.497945][ C0] ? __pfx_ip_rcv+0x10/0x10\n[ \n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38035", "url": "https://www.suse.com/security/cve/CVE-2025-38035" }, { "category": "external", "summary": "SUSE Bug 1244801 for CVE-2025-38035", "url": "https://bugzilla.suse.com/1244801" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38035" }, { "cve": "CVE-2025-38040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38040" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: mctrl_gpio: split disable_ms into sync and no_sync APIs\n\nThe following splat has been observed on a SAMA5D27 platform using\natmel_serial:\n\nBUG: sleeping function called from invalid context at kernel/irq/manage.c:738\nin_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 27, name: kworker/u5:0\npreempt_count: 1, expected: 0\nINFO: lockdep is turned off.\nirq event stamp: 0\nhardirqs last enabled at (0): [\u003c00000000\u003e] 0x0\nhardirqs last disabled at (0): [\u003cc01588f0\u003e] copy_process+0x1c4c/0x7bec\nsoftirqs last enabled at (0): [\u003cc0158944\u003e] copy_process+0x1ca0/0x7bec\nsoftirqs last disabled at (0): [\u003c00000000\u003e] 0x0\nCPU: 0 UID: 0 PID: 27 Comm: kworker/u5:0 Not tainted 6.13.0-rc7+ #74\nHardware name: Atmel SAMA5\nWorkqueue: hci0 hci_power_on [bluetooth]\nCall trace:\n unwind_backtrace from show_stack+0x18/0x1c\n show_stack from dump_stack_lvl+0x44/0x70\n dump_stack_lvl from __might_resched+0x38c/0x598\n __might_resched from disable_irq+0x1c/0x48\n disable_irq from mctrl_gpio_disable_ms+0x74/0xc0\n mctrl_gpio_disable_ms from atmel_disable_ms.part.0+0x80/0x1f4\n atmel_disable_ms.part.0 from atmel_set_termios+0x764/0x11e8\n atmel_set_termios from uart_change_line_settings+0x15c/0x994\n uart_change_line_settings from uart_set_termios+0x2b0/0x668\n uart_set_termios from tty_set_termios+0x600/0x8ec\n tty_set_termios from ttyport_set_flow_control+0x188/0x1e0\n ttyport_set_flow_control from wilc_setup+0xd0/0x524 [hci_wilc]\n wilc_setup [hci_wilc] from hci_dev_open_sync+0x330/0x203c [bluetooth]\n hci_dev_open_sync [bluetooth] from hci_dev_do_open+0x40/0xb0 [bluetooth]\n hci_dev_do_open [bluetooth] from hci_power_on+0x12c/0x664 [bluetooth]\n hci_power_on [bluetooth] from process_one_work+0x998/0x1a38\n process_one_work from worker_thread+0x6e0/0xfb4\n worker_thread from kthread+0x3d4/0x484\n kthread from ret_from_fork+0x14/0x28\n\nThis warning is emitted when trying to toggle, at the highest level,\nsome flow control (with serdev_device_set_flow_control) in a device\ndriver. At the lowest level, the atmel_serial driver is using\nserial_mctrl_gpio lib to enable/disable the corresponding IRQs\naccordingly. The warning emitted by CONFIG_DEBUG_ATOMIC_SLEEP is due to\ndisable_irq (called in mctrl_gpio_disable_ms) being possibly called in\nsome atomic context (some tty drivers perform modem lines configuration\nin regions protected by port lock).\n\nSplit mctrl_gpio_disable_ms into two differents APIs, a non-blocking one\nand a blocking one. Replace mctrl_gpio_disable_ms calls with the\nrelevant version depending on whether the call is protected by some port\nlock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38040", "url": "https://www.suse.com/security/cve/CVE-2025-38040" }, { "category": "external", "summary": "SUSE Bug 1245078 for CVE-2025-38040", "url": "https://bugzilla.suse.com/1245078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38040" }, { "cve": "CVE-2025-38051", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38051" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix use-after-free in cifs_fill_dirent\n\nThere is a race condition in the readdir concurrency process, which may\naccess the rsp buffer after it has been released, triggering the\nfollowing KASAN warning.\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in cifs_fill_dirent+0xb03/0xb60 [cifs]\n Read of size 4 at addr ffff8880099b819c by task a.out/342975\n\n CPU: 2 UID: 0 PID: 342975 Comm: a.out Not tainted 6.15.0-rc6+ #240 PREEMPT(full)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x53/0x70\n print_report+0xce/0x640\n kasan_report+0xb8/0xf0\n cifs_fill_dirent+0xb03/0xb60 [cifs]\n cifs_readdir+0x12cb/0x3190 [cifs]\n iterate_dir+0x1a1/0x520\n __x64_sys_getdents+0x134/0x220\n do_syscall_64+0x4b/0x110\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n RIP: 0033:0x7f996f64b9f9\n Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89\n f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01\n f0 ff ff 0d f7 c3 0c 00 f7 d8 64 89 8\n RSP: 002b:00007f996f53de78 EFLAGS: 00000207 ORIG_RAX: 000000000000004e\n RAX: ffffffffffffffda RBX: 00007f996f53ecdc RCX: 00007f996f64b9f9\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003\n RBP: 00007f996f53dea0 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000207 R12: ffffffffffffff88\n R13: 0000000000000000 R14: 00007ffc8cd9a500 R15: 00007f996f51e000\n \u003c/TASK\u003e\n\n Allocated by task 408:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x14/0x30\n __kasan_slab_alloc+0x6e/0x70\n kmem_cache_alloc_noprof+0x117/0x3d0\n mempool_alloc_noprof+0xf2/0x2c0\n cifs_buf_get+0x36/0x80 [cifs]\n allocate_buffers+0x1d2/0x330 [cifs]\n cifs_demultiplex_thread+0x22b/0x2690 [cifs]\n kthread+0x394/0x720\n ret_from_fork+0x34/0x70\n ret_from_fork_asm+0x1a/0x30\n\n Freed by task 342979:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x60\n __kasan_slab_free+0x37/0x50\n kmem_cache_free+0x2b8/0x500\n cifs_buf_release+0x3c/0x70 [cifs]\n cifs_readdir+0x1c97/0x3190 [cifs]\n iterate_dir+0x1a1/0x520\n __x64_sys_getdents64+0x134/0x220\n do_syscall_64+0x4b/0x110\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n The buggy address belongs to the object at ffff8880099b8000\n which belongs to the cache cifs_request of size 16588\n The buggy address is located 412 bytes inside of\n freed 16588-byte region [ffff8880099b8000, ffff8880099bc0cc)\n\n The buggy address belongs to the physical page:\n page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x99b8\n head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n anon flags: 0x80000000000040(head|node=0|zone=1)\n page_type: f5(slab)\n raw: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000003 ffffea0000266e01 00000000ffffffff 00000000ffffffff\n head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n ffff8880099b8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ffff8880099b8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n \u003effff8880099b8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ^\n ffff8880099b8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ffff8880099b8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ==================================================================\n\nPOC is available in the link [1].\n\nThe problem triggering process is as follows:\n\nProcess 1 Process 2\n-----------------------------------\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38051", "url": "https://www.suse.com/security/cve/CVE-2025-38051" }, { "category": "external", "summary": "SUSE Bug 1244750 for CVE-2025-38051", "url": "https://bugzilla.suse.com/1244750" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38051" }, { "cve": "CVE-2025-38058", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38058" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\n__legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock\n\n... or we risk stealing final mntput from sync umount - raising mnt_count\nafter umount(2) has verified that victim is not busy, but before it\nhas set MNT_SYNC_UMOUNT; in that case __legitimize_mnt() doesn\u0027t see\nthat it\u0027s safe to quietly undo mnt_count increment and leaves dropping\nthe reference to caller, where it\u0027ll be a full-blown mntput().\n\nCheck under mount_lock is needed; leaving the current one done before\ntaking that makes no sense - it\u0027s nowhere near common enough to bother\nwith.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38058", "url": "https://www.suse.com/security/cve/CVE-2025-38058" }, { "category": "external", "summary": "SUSE Bug 1245151 for CVE-2025-38058", "url": "https://bugzilla.suse.com/1245151" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "low" } ], "title": "CVE-2025-38058" }, { "cve": "CVE-2025-38064", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38064" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio: break and reset virtio devices on device_shutdown()\n\nHongyu reported a hang on kexec in a VM. QEMU reported invalid memory\naccesses during the hang.\n\n\tInvalid read at addr 0x102877002, size 2, region \u0027(null)\u0027, reason: rejected\n\tInvalid write at addr 0x102877A44, size 2, region \u0027(null)\u0027, reason: rejected\n\t...\n\nIt was traced down to virtio-console. Kexec works fine if virtio-console\nis not in use.\n\nThe issue is that virtio-console continues to write to the MMIO even after\nunderlying virtio-pci device is reset.\n\nAdditionally, Eric noticed that IOMMUs are reset before devices, if\ndevices are not reset on shutdown they continue to poke at guest memory\nand get errors from the IOMMU. Some devices get wedged then.\n\nThe problem can be solved by breaking all virtio devices on virtio\nbus shutdown, then resetting them.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38064", "url": "https://www.suse.com/security/cve/CVE-2025-38064" }, { "category": "external", "summary": "SUSE Bug 1245201 for CVE-2025-38064", "url": "https://bugzilla.suse.com/1245201" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38064" }, { "cve": "CVE-2025-38068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38068" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: lzo - Fix compression buffer overrun\n\nUnlike the decompression code, the compression code in LZO never\nchecked for output overruns. It instead assumes that the caller\nalways provides enough buffer space, disregarding the buffer length\nprovided by the caller.\n\nAdd a safe compression interface that checks for the end of buffer\nbefore each write. Use the safe interface in crypto/lzo.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38068", "url": "https://www.suse.com/security/cve/CVE-2025-38068" }, { "category": "external", "summary": "SUSE Bug 1245210 for CVE-2025-38068", "url": "https://bugzilla.suse.com/1245210" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38068" }, { "cve": "CVE-2025-38074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38074" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost-scsi: protect vq-\u003elog_used with vq-\u003emutex\n\nThe vhost-scsi completion path may access vq-\u003elog_base when vq-\u003elog_used is\nalready set to false.\n\n vhost-thread QEMU-thread\n\nvhost_scsi_complete_cmd_work()\n-\u003e vhost_add_used()\n -\u003e vhost_add_used_n()\n if (unlikely(vq-\u003elog_used))\n QEMU disables vq-\u003elog_used\n via VHOST_SET_VRING_ADDR.\n mutex_lock(\u0026vq-\u003emutex);\n vq-\u003elog_used = false now!\n mutex_unlock(\u0026vq-\u003emutex);\n\n\t\t\t\t QEMU gfree(vq-\u003elog_base)\n log_used()\n -\u003e log_write(vq-\u003elog_base)\n\nAssuming the VMM is QEMU. The vq-\u003elog_base is from QEMU userpace and can be\nreclaimed via gfree(). As a result, this causes invalid memory writes to\nQEMU userspace.\n\nThe control queue path has the same issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38074", "url": "https://www.suse.com/security/cve/CVE-2025-38074" }, { "category": "external", "summary": "SUSE Bug 1244735 for CVE-2025-38074", "url": "https://bugzilla.suse.com/1244735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38074" }, { "cve": "CVE-2025-38079", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38079" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: algif_hash - fix double free in hash_accept\n\nIf accept(2) is called on socket type algif_hash with\nMSG_MORE flag set and crypto_ahash_import fails,\nsk2 is freed. However, it is also freed in af_alg_release,\nleading to slab-use-after-free error.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38079", "url": "https://www.suse.com/security/cve/CVE-2025-38079" }, { "category": "external", "summary": "SUSE Bug 1245217 for CVE-2025-38079", "url": "https://bugzilla.suse.com/1245217" }, { "category": "external", "summary": "SUSE Bug 1245218 for CVE-2025-38079", "url": "https://bugzilla.suse.com/1245218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "important" } ], "title": "CVE-2025-38079" }, { "cve": "CVE-2025-38094", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38094" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: cadence: macb: Fix a possible deadlock in macb_halt_tx.\n\nThere is a situation where after THALT is set high, TGO stays high as\nwell. Because jiffies are never updated, as we are in a context with\ninterrupts disabled, we never exit that loop and have a deadlock.\n\nThat deadlock was noticed on a sama5d4 device that stayed locked for days.\n\nUse retries instead of jiffies so that the timeout really works and we do\nnot have a deadlock anymore.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38094", "url": "https://www.suse.com/security/cve/CVE-2025-38094" }, { "category": "external", "summary": "SUSE Bug 1245649 for CVE-2025-38094", "url": "https://bugzilla.suse.com/1245649" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38094" }, { "cve": "CVE-2025-38105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38105" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Kill timer properly at removal\n\nThe USB-audio MIDI code initializes the timer, but in a rare case, the\ndriver might be freed without the disconnect call. This leaves the\ntimer in an active state while the assigned object is released via\nsnd_usbmidi_free(), which ends up with a kernel warning when the debug\nconfiguration is enabled, as spotted by fuzzer.\n\nFor avoiding the problem, put timer_shutdown_sync() at\nsnd_usbmidi_free(), so that the timer can be killed properly.\nWhile we\u0027re at it, replace the existing timer_delete_sync() at the\ndisconnect callback with timer_shutdown_sync(), too.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38105", "url": "https://www.suse.com/security/cve/CVE-2025-38105" }, { "category": "external", "summary": "SUSE Bug 1245682 for CVE-2025-38105", "url": "https://bugzilla.suse.com/1245682" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38105" }, { "cve": "CVE-2025-38108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38108" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: red: fix a race in __red_change()\n\nGerrard Tai reported a race condition in RED, whenever SFQ perturb timer\nfires at the wrong time.\n\nThe race is as follows:\n\nCPU 0 CPU 1\n[1]: lock root\n[2]: qdisc_tree_flush_backlog()\n[3]: unlock root\n |\n | [5]: lock root\n | [6]: rehash\n | [7]: qdisc_tree_reduce_backlog()\n |\n[4]: qdisc_put()\n\nThis can be abused to underflow a parent\u0027s qlen.\n\nCalling qdisc_purge_queue() instead of qdisc_tree_flush_backlog()\nshould fix the race, because all packets will be purged from the qdisc\nbefore releasing the lock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38108", "url": "https://www.suse.com/security/cve/CVE-2025-38108" }, { "category": "external", "summary": "SUSE Bug 1245675 for CVE-2025-38108", "url": "https://bugzilla.suse.com/1245675" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38108" }, { "cve": "CVE-2025-38112", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38112" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: Fix TOCTOU issue in sk_is_readable()\n\nsk-\u003esk_prot-\u003esock_is_readable is a valid function pointer when sk resides\nin a sockmap. After the last sk_psock_put() (which usually happens when\nsocket is removed from sockmap), sk-\u003esk_prot gets restored and\nsk-\u003esk_prot-\u003esock_is_readable becomes NULL.\n\nThis makes sk_is_readable() racy, if the value of sk-\u003esk_prot is reloaded\nafter the initial check. Which in turn may lead to a null pointer\ndereference.\n\nEnsure the function pointer does not turn NULL after the check.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38112", "url": "https://www.suse.com/security/cve/CVE-2025-38112" }, { "category": "external", "summary": "SUSE Bug 1245668 for CVE-2025-38112", "url": "https://bugzilla.suse.com/1245668" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38112" }, { "cve": "CVE-2025-38115", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38115" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: sch_sfq: fix a potential crash on gso_skb handling\n\nSFQ has an assumption of always being able to queue at least one packet.\n\nHowever, after the blamed commit, sch-\u003eq.len can be inflated by packets\nin sch-\u003egso_skb, and an enqueue() on an empty SFQ qdisc can be followed\nby an immediate drop.\n\nFix sfq_drop() to properly clear q-\u003etail in this situation.\n\n\nip netns add lb\nip link add dev to-lb type veth peer name in-lb netns lb\nethtool -K to-lb tso off # force qdisc to requeue gso_skb\nip netns exec lb ethtool -K in-lb gro on # enable NAPI\nip link set dev to-lb up\nip -netns lb link set dev in-lb up\nip addr add dev to-lb 192.168.20.1/24\nip -netns lb addr add dev in-lb 192.168.20.2/24\ntc qdisc replace dev to-lb root sfq limit 100\n\nip netns exec lb netserver\n\nnetperf -H 192.168.20.2 -l 100 \u0026\nnetperf -H 192.168.20.2 -l 100 \u0026\nnetperf -H 192.168.20.2 -l 100 \u0026\nnetperf -H 192.168.20.2 -l 100 \u0026", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38115", "url": "https://www.suse.com/security/cve/CVE-2025-38115" }, { "category": "external", "summary": "SUSE Bug 1245689 for CVE-2025-38115", "url": "https://bugzilla.suse.com/1245689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38115" }, { "cve": "CVE-2025-38126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38126" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: make sure that ptp_rate is not 0 before configuring timestamping\n\nThe stmmac platform drivers that do not open-code the clk_ptp_rate value\nafter having retrieved the default one from the device-tree can end up\nwith 0 in clk_ptp_rate (as clk_get_rate can return 0). It will\neventually propagate up to PTP initialization when bringing up the\ninterface, leading to a divide by 0:\n\n Division by zero in kernel.\n CPU: 1 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.30-00001-g48313bd5768a #22\n Hardware name: STM32 (Device Tree Support)\n Call trace:\n unwind_backtrace from show_stack+0x18/0x1c\n show_stack from dump_stack_lvl+0x6c/0x8c\n dump_stack_lvl from Ldiv0_64+0x8/0x18\n Ldiv0_64 from stmmac_init_tstamp_counter+0x190/0x1a4\n stmmac_init_tstamp_counter from stmmac_hw_setup+0xc1c/0x111c\n stmmac_hw_setup from __stmmac_open+0x18c/0x434\n __stmmac_open from stmmac_open+0x3c/0xbc\n stmmac_open from __dev_open+0xf4/0x1ac\n __dev_open from __dev_change_flags+0x1cc/0x224\n __dev_change_flags from dev_change_flags+0x24/0x60\n dev_change_flags from ip_auto_config+0x2e8/0x11a0\n ip_auto_config from do_one_initcall+0x84/0x33c\n do_one_initcall from kernel_init_freeable+0x1b8/0x214\n kernel_init_freeable from kernel_init+0x24/0x140\n kernel_init from ret_from_fork+0x14/0x28\n Exception stack(0xe0815fb0 to 0xe0815ff8)\n\nPrevent this division by 0 by adding an explicit check and error log\nabout the actual issue. While at it, remove the same check from\nstmmac_ptp_register, which then becomes duplicate", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38126", "url": "https://www.suse.com/security/cve/CVE-2025-38126" }, { "category": "external", "summary": "SUSE Bug 1245708 for CVE-2025-38126", "url": "https://bugzilla.suse.com/1245708" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38126" }, { "cve": "CVE-2025-38147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38147" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncalipso: Don\u0027t call calipso functions for AF_INET sk.\n\nsyzkaller reported a null-ptr-deref in txopt_get(). [0]\n\nThe offset 0x70 was of struct ipv6_txoptions in struct ipv6_pinfo,\nso struct ipv6_pinfo was NULL there.\n\nHowever, this never happens for IPv6 sockets as inet_sk(sk)-\u003epinet6\nis always set in inet6_create(), meaning the socket was not IPv6 one.\n\nThe root cause is missing validation in netlbl_conn_setattr().\n\nnetlbl_conn_setattr() switches branches based on struct\nsockaddr.sa_family, which is passed from userspace. However,\nnetlbl_conn_setattr() does not check if the address family matches\nthe socket.\n\nThe syzkaller must have called connect() for an IPv6 address on\nan IPv4 socket.\n\nWe have a proper validation in tcp_v[46]_connect(), but\nsecurity_socket_connect() is called in the earlier stage.\n\nLet\u0027s copy the validation to netlbl_conn_setattr().\n\n[0]:\nOops: general protection fault, probably for non-canonical address 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077]\nCPU: 2 UID: 0 PID: 12928 Comm: syz.9.1677 Not tainted 6.12.0 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nRIP: 0010:txopt_get include/net/ipv6.h:390 [inline]\nRIP: 0010:\nCode: 02 00 00 49 8b ac 24 f8 02 00 00 e8 84 69 2a fd e8 ff 00 16 fd 48 8d 7d 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 53 02 00 00 48 8b 6d 70 48 85 ed 0f 84 ab 01 00\nRSP: 0018:ffff88811b8afc48 EFLAGS: 00010212\nRAX: dffffc0000000000 RBX: 1ffff11023715f8a RCX: ffffffff841ab00c\nRDX: 000000000000000e RSI: ffffc90007d9e000 RDI: 0000000000000070\nRBP: 0000000000000000 R08: ffffed1023715f9d R09: ffffed1023715f9e\nR10: ffffed1023715f9d R11: 0000000000000003 R12: ffff888123075f00\nR13: ffff88810245bd80 R14: ffff888113646780 R15: ffff888100578a80\nFS: 00007f9019bd7640(0000) GS:ffff8882d2d00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f901b927bac CR3: 0000000104788003 CR4: 0000000000770ef0\nPKRU: 80000000\nCall Trace:\n \u003cTASK\u003e\n calipso_sock_setattr+0x56/0x80 net/netlabel/netlabel_calipso.c:557\n netlbl_conn_setattr+0x10c/0x280 net/netlabel/netlabel_kapi.c:1177\n selinux_netlbl_socket_connect_helper+0xd3/0x1b0 security/selinux/netlabel.c:569\n selinux_netlbl_socket_connect_locked security/selinux/netlabel.c:597 [inline]\n selinux_netlbl_socket_connect+0xb6/0x100 security/selinux/netlabel.c:615\n selinux_socket_connect+0x5f/0x80 security/selinux/hooks.c:4931\n security_socket_connect+0x50/0xa0 security/security.c:4598\n __sys_connect_file+0xa4/0x190 net/socket.c:2067\n __sys_connect+0x12c/0x170 net/socket.c:2088\n __do_sys_connect net/socket.c:2098 [inline]\n __se_sys_connect net/socket.c:2095 [inline]\n __x64_sys_connect+0x73/0xb0 net/socket.c:2095\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xaa/0x1b0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f901b61a12d\nCode: 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f9019bd6fa8 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f901b925fa0 RCX: 00007f901b61a12d\nRDX: 000000000000001c RSI: 0000200000000140 RDI: 0000000000000003\nRBP: 00007f901b701505 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 0000000000000000 R14: 00007f901b5b62a0 R15: 00007f9019bb7000\n \u003c/TASK\u003e\nModules linked in:", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38147", "url": "https://www.suse.com/security/cve/CVE-2025-38147" }, { "category": "external", "summary": "SUSE Bug 1245768 for CVE-2025-38147", "url": "https://bugzilla.suse.com/1245768" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38147" }, { "cve": "CVE-2025-38157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38157" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k_htc: Abort software beacon handling if disabled\n\nA malicious USB device can send a WMI_SWBA_EVENTID event from an\nath9k_htc-managed device before beaconing has been enabled. This causes\na device-by-zero error in the driver, leading to either a crash or an\nout of bounds read.\n\nPrevent this by aborting the handling in ath9k_htc_swba() if beacons are\nnot enabled.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38157", "url": "https://www.suse.com/security/cve/CVE-2025-38157" }, { "category": "external", "summary": "SUSE Bug 1245747 for CVE-2025-38157", "url": "https://bugzilla.suse.com/1245747" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38157" }, { "cve": "CVE-2025-38161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38161" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Fix error flow upon firmware failure for RQ destruction\n\nUpon RQ destruction if the firmware command fails which is the\nlast resource to be destroyed some SW resources were already cleaned\nregardless of the failure.\n\nNow properly rollback the object to its original state upon such failure.\n\nIn order to avoid a use-after free in case someone tries to destroy the\nobject again, which results in the following kernel trace:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 0 PID: 37589 at lib/refcount.c:28 refcount_warn_saturate+0xf4/0x148\nModules linked in: rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) rfkill mlx5_core(OE) mlxdevm(OE) ib_uverbs(OE) ib_core(OE) psample mlxfw(OE) mlx_compat(OE) macsec tls pci_hyperv_intf sunrpc vfat fat virtio_net net_failover failover fuse loop nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vmw_vmci vsock xfs crct10dif_ce ghash_ce sha2_ce sha256_arm64 sha1_ce virtio_console virtio_gpu virtio_blk virtio_dma_buf virtio_mmio dm_mirror dm_region_hash dm_log dm_mod xpmem(OE)\nCPU: 0 UID: 0 PID: 37589 Comm: python3 Kdump: loaded Tainted: G OE ------- --- 6.12.0-54.el10.aarch64 #1\nTainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\nHardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015\npstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : refcount_warn_saturate+0xf4/0x148\nlr : refcount_warn_saturate+0xf4/0x148\nsp : ffff80008b81b7e0\nx29: ffff80008b81b7e0 x28: ffff000133d51600 x27: 0000000000000001\nx26: 0000000000000000 x25: 00000000ffffffea x24: ffff00010ae80f00\nx23: ffff00010ae80f80 x22: ffff0000c66e5d08 x21: 0000000000000000\nx20: ffff0000c66e0000 x19: ffff00010ae80340 x18: 0000000000000006\nx17: 0000000000000000 x16: 0000000000000020 x15: ffff80008b81b37f\nx14: 0000000000000000 x13: 2e656572662d7265 x12: ffff80008283ef78\nx11: ffff80008257efd0 x10: ffff80008283efd0 x9 : ffff80008021ed90\nx8 : 0000000000000001 x7 : 00000000000bffe8 x6 : c0000000ffff7fff\nx5 : ffff0001fb8e3408 x4 : 0000000000000000 x3 : ffff800179993000\nx2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000133d51600\nCall trace:\n refcount_warn_saturate+0xf4/0x148\n mlx5_core_put_rsc+0x88/0xa0 [mlx5_ib]\n mlx5_core_destroy_rq_tracked+0x64/0x98 [mlx5_ib]\n mlx5_ib_destroy_wq+0x34/0x80 [mlx5_ib]\n ib_destroy_wq_user+0x30/0xc0 [ib_core]\n uverbs_free_wq+0x28/0x58 [ib_uverbs]\n destroy_hw_idr_uobject+0x34/0x78 [ib_uverbs]\n uverbs_destroy_uobject+0x48/0x240 [ib_uverbs]\n __uverbs_cleanup_ufile+0xd4/0x1a8 [ib_uverbs]\n uverbs_destroy_ufile_hw+0x48/0x120 [ib_uverbs]\n ib_uverbs_close+0x2c/0x100 [ib_uverbs]\n __fput+0xd8/0x2f0\n __fput_sync+0x50/0x70\n __arm64_sys_close+0x40/0x90\n invoke_syscall.constprop.0+0x74/0xd0\n do_el0_svc+0x48/0xe8\n el0_svc+0x44/0x1d0\n el0t_64_sync_handler+0x120/0x130\n el0t_64_sync+0x1a4/0x1a8", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38161", "url": "https://www.suse.com/security/cve/CVE-2025-38161" }, { "category": "external", "summary": "SUSE Bug 1245777 for CVE-2025-38161", "url": "https://bugzilla.suse.com/1245777" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38161" }, { "cve": "CVE-2025-38166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38166" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: fix ktls panic with sockmap\n\n[ 2172.936997] ------------[ cut here ]------------\n[ 2172.936999] kernel BUG at lib/iov_iter.c:629!\n......\n[ 2172.944996] PKRU: 55555554\n[ 2172.945155] Call Trace:\n[ 2172.945299] \u003cTASK\u003e\n[ 2172.945428] ? die+0x36/0x90\n[ 2172.945601] ? do_trap+0xdd/0x100\n[ 2172.945795] ? iov_iter_revert+0x178/0x180\n[ 2172.946031] ? iov_iter_revert+0x178/0x180\n[ 2172.946267] ? do_error_trap+0x7d/0x110\n[ 2172.946499] ? iov_iter_revert+0x178/0x180\n[ 2172.946736] ? exc_invalid_op+0x50/0x70\n[ 2172.946961] ? iov_iter_revert+0x178/0x180\n[ 2172.947197] ? asm_exc_invalid_op+0x1a/0x20\n[ 2172.947446] ? iov_iter_revert+0x178/0x180\n[ 2172.947683] ? iov_iter_revert+0x5c/0x180\n[ 2172.947913] tls_sw_sendmsg_locked.isra.0+0x794/0x840\n[ 2172.948206] tls_sw_sendmsg+0x52/0x80\n[ 2172.948420] ? inet_sendmsg+0x1f/0x70\n[ 2172.948634] __sys_sendto+0x1cd/0x200\n[ 2172.948848] ? find_held_lock+0x2b/0x80\n[ 2172.949072] ? syscall_trace_enter+0x140/0x270\n[ 2172.949330] ? __lock_release.isra.0+0x5e/0x170\n[ 2172.949595] ? find_held_lock+0x2b/0x80\n[ 2172.949817] ? syscall_trace_enter+0x140/0x270\n[ 2172.950211] ? lockdep_hardirqs_on_prepare+0xda/0x190\n[ 2172.950632] ? ktime_get_coarse_real_ts64+0xc2/0xd0\n[ 2172.951036] __x64_sys_sendto+0x24/0x30\n[ 2172.951382] do_syscall_64+0x90/0x170\n......\n\nAfter calling bpf_exec_tx_verdict(), the size of msg_pl-\u003esg may increase,\ne.g., when the BPF program executes bpf_msg_push_data().\n\nIf the BPF program sets cork_bytes and sg.size is smaller than cork_bytes,\nit will return -ENOSPC and attempt to roll back to the non-zero copy\nlogic. However, during rollback, msg-\u003emsg_iter is reset, but since\nmsg_pl-\u003esg.size has been increased, subsequent executions will exceed the\nactual size of msg_iter.\n\u0027\u0027\u0027\niov_iter_revert(\u0026msg-\u003emsg_iter, msg_pl-\u003esg.size - orig_size);\n\u0027\u0027\u0027\n\nThe changes in this commit are based on the following considerations:\n\n1. When cork_bytes is set, rolling back to non-zero copy logic is\npointless and can directly go to zero-copy logic.\n\n2. We can not calculate the correct number of bytes to revert msg_iter.\n\nAssume the original data is \"abcdefgh\" (8 bytes), and after 3 pushes\nby the BPF program, it becomes 11-byte data: \"abc?de?fgh?\".\nThen, we set cork_bytes to 6, which means the first 6 bytes have been\nprocessed, and the remaining 5 bytes \"?fgh?\" will be cached until the\nlength meets the cork_bytes requirement.\n\nHowever, some data in \"?fgh?\" is not within \u0027sg-\u003emsg_iter\u0027\n(but in msg_pl instead), especially the data \"?\" we pushed.\n\nSo it doesn\u0027t seem as simple as just reverting through an offset of\nmsg_iter.\n\n3. For non-TLS sockets in tcp_bpf_sendmsg, when a \"cork\" situation occurs,\nthe user-space send() doesn\u0027t return an error, and the returned length is\nthe same as the input length parameter, even if some data is cached.\n\nAdditionally, I saw that the current non-zero-copy logic for handling\ncorking is written as:\n\u0027\u0027\u0027\nline 1177\nelse if (ret != -EAGAIN) {\n\tif (ret == -ENOSPC)\n\t\tret = 0;\n\tgoto send_end;\n\u0027\u0027\u0027\n\nSo it\u0027s ok to just return \u0027copied\u0027 without error when a \"cork\" situation\noccurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38166", "url": "https://www.suse.com/security/cve/CVE-2025-38166" }, { "category": "external", "summary": "SUSE Bug 1245758 for CVE-2025-38166", "url": "https://bugzilla.suse.com/1245758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38166" }, { "cve": "CVE-2025-38177", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38177" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_hfsc: make hfsc_qlen_notify() idempotent\n\nhfsc_qlen_notify() is not idempotent either and not friendly\nto its callers, like fq_codel_dequeue(). Let\u0027s make it idempotent\nto ease qdisc_tree_reduce_backlog() callers\u0027 life:\n\n1. update_vf() decreases cl-\u003ecl_nactive, so we can check whether it is\nnon-zero before calling it.\n\n2. eltree_remove() always removes RB node cl-\u003eel_node, but we can use\n RB_EMPTY_NODE() + RB_CLEAR_NODE() to make it safe.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38177", "url": "https://www.suse.com/security/cve/CVE-2025-38177" }, { "category": "external", "summary": "SUSE Bug 1245986 for CVE-2025-38177", "url": "https://bugzilla.suse.com/1245986" }, { "category": "external", "summary": "SUSE Bug 1246356 for CVE-2025-38177", "url": "https://bugzilla.suse.com/1246356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "important" } ], "title": "CVE-2025-38177" }, { "cve": "CVE-2025-38180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38180" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atm: fix /proc/net/atm/lec handling\n\n/proc/net/atm/lec must ensure safety against dev_lec[] changes.\n\nIt appears it had dev_put() calls without prior dev_hold(),\nleading to imbalance and UAF.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38180", "url": "https://www.suse.com/security/cve/CVE-2025-38180" }, { "category": "external", "summary": "SUSE Bug 1245970 for CVE-2025-38180", "url": "https://bugzilla.suse.com/1245970" }, { "category": "external", "summary": "SUSE Bug 1245971 for CVE-2025-38180", "url": "https://bugzilla.suse.com/1245971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "important" } ], "title": "CVE-2025-38180" }, { "cve": "CVE-2025-38181", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38181" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncalipso: Fix null-ptr-deref in calipso_req_{set,del}attr().\n\nsyzkaller reported a null-ptr-deref in sock_omalloc() while allocating\na CALIPSO option. [0]\n\nThe NULL is of struct sock, which was fetched by sk_to_full_sk() in\ncalipso_req_setattr().\n\nSince commit a1a5344ddbe8 (\"tcp: avoid two atomic ops for syncookies\"),\nreqsk-\u003ersk_listener could be NULL when SYN Cookie is returned to its\nclient, as hinted by the leading SYN Cookie log.\n\nHere are 3 options to fix the bug:\n\n 1) Return 0 in calipso_req_setattr()\n 2) Return an error in calipso_req_setattr()\n 3) Alaways set rsk_listener\n\n1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie\nfor CALIPSO. 3) is also no go as there have been many efforts to reduce\natomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35\n(\"tcp/dccp: do not touch listener sk_refcnt under synflood\").\n\nAs of the blamed commit, SYN Cookie already did not need refcounting,\nand no one has stumbled on the bug for 9 years, so no CALIPSO user will\ncare about SYN Cookie.\n\nLet\u0027s return an error in calipso_req_setattr() and calipso_req_delattr()\nin the SYN Cookie case.\n\nThis can be reproduced by [1] on Fedora and now connect() of nc times out.\n\n[0]:\nTCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]\nCPU: 3 UID: 0 PID: 12262 Comm: syz.1.2611 Not tainted 6.14.0 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nRIP: 0010:read_pnet include/net/net_namespace.h:406 [inline]\nRIP: 0010:sock_net include/net/sock.h:655 [inline]\nRIP: 0010:sock_kmalloc+0x35/0x170 net/core/sock.c:2806\nCode: 89 d5 41 54 55 89 f5 53 48 89 fb e8 25 e3 c6 fd e8 f0 91 e3 00 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 26 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b\nRSP: 0018:ffff88811af89038 EFLAGS: 00010216\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff888105266400\nRDX: 0000000000000006 RSI: ffff88800c890000 RDI: 0000000000000030\nRBP: 0000000000000050 R08: 0000000000000000 R09: ffff88810526640e\nR10: ffffed1020a4cc81 R11: ffff88810526640f R12: 0000000000000000\nR13: 0000000000000820 R14: ffff888105266400 R15: 0000000000000050\nFS: 00007f0653a07640(0000) GS:ffff88811af80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f863ba096f4 CR3: 00000000163c0005 CR4: 0000000000770ef0\nPKRU: 80000000\nCall Trace:\n \u003cIRQ\u003e\n ipv6_renew_options+0x279/0x950 net/ipv6/exthdrs.c:1288\n calipso_req_setattr+0x181/0x340 net/ipv6/calipso.c:1204\n calipso_req_setattr+0x56/0x80 net/netlabel/netlabel_calipso.c:597\n netlbl_req_setattr+0x18a/0x440 net/netlabel/netlabel_kapi.c:1249\n selinux_netlbl_inet_conn_request+0x1fb/0x320 security/selinux/netlabel.c:342\n selinux_inet_conn_request+0x1eb/0x2c0 security/selinux/hooks.c:5551\n security_inet_conn_request+0x50/0xa0 security/security.c:4945\n tcp_v6_route_req+0x22c/0x550 net/ipv6/tcp_ipv6.c:825\n tcp_conn_request+0xec8/0x2b70 net/ipv4/tcp_input.c:7275\n tcp_v6_conn_request+0x1e3/0x440 net/ipv6/tcp_ipv6.c:1328\n tcp_rcv_state_process+0xafa/0x52b0 net/ipv4/tcp_input.c:6781\n tcp_v6_do_rcv+0x8a6/0x1a40 net/ipv6/tcp_ipv6.c:1667\n tcp_v6_rcv+0x505e/0x5b50 net/ipv6/tcp_ipv6.c:1904\n ip6_protocol_deliver_rcu+0x17c/0x1da0 net/ipv6/ip6_input.c:436\n ip6_input_finish+0x103/0x180 net/ipv6/ip6_input.c:480\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip6_input+0x13c/0x6b0 net/ipv6/ip6_input.c:491\n dst_input include/net/dst.h:469 [inline]\n ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]\n ip6_rcv_finish+0xb6/0x490 net/ipv6/ip6_input.c:69\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netf\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38181", "url": "https://www.suse.com/security/cve/CVE-2025-38181" }, { "category": "external", "summary": "SUSE Bug 1246000 for CVE-2025-38181", "url": "https://bugzilla.suse.com/1246000" }, { "category": "external", "summary": "SUSE Bug 1246001 for CVE-2025-38181", "url": "https://bugzilla.suse.com/1246001" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "important" } ], "title": "CVE-2025-38181" }, { "cve": "CVE-2025-38192", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38192" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: clear the dst when changing skb protocol\n\nA not-so-careful NAT46 BPF program can crash the kernel\nif it indiscriminately flips ingress packets from v4 to v6:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n ip6_rcv_core (net/ipv6/ip6_input.c:190:20)\n ipv6_rcv (net/ipv6/ip6_input.c:306:8)\n process_backlog (net/core/dev.c:6186:4)\n napi_poll (net/core/dev.c:6906:9)\n net_rx_action (net/core/dev.c:7028:13)\n do_softirq (kernel/softirq.c:462:3)\n netif_rx (net/core/dev.c:5326:3)\n dev_loopback_xmit (net/core/dev.c:4015:2)\n ip_mc_finish_output (net/ipv4/ip_output.c:363:8)\n NF_HOOK (./include/linux/netfilter.h:314:9)\n ip_mc_output (net/ipv4/ip_output.c:400:5)\n dst_output (./include/net/dst.h:459:9)\n ip_local_out (net/ipv4/ip_output.c:130:9)\n ip_send_skb (net/ipv4/ip_output.c:1496:8)\n udp_send_skb (net/ipv4/udp.c:1040:8)\n udp_sendmsg (net/ipv4/udp.c:1328:10)\n\nThe output interface has a 4-\u003e6 program attached at ingress.\nWe try to loop the multicast skb back to the sending socket.\nIngress BPF runs as part of netif_rx(), pushes a valid v6 hdr\nand changes skb-\u003eprotocol to v6. We enter ip6_rcv_core which\ntries to use skb_dst(). But the dst is still an IPv4 one left\nafter IPv4 mcast output.\n\nClear the dst in all BPF helpers which change the protocol.\nTry to preserve metadata dsts, those may carry non-routing\nmetadata.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38192", "url": "https://www.suse.com/security/cve/CVE-2025-38192" }, { "category": "external", "summary": "SUSE Bug 1245954 for CVE-2025-38192", "url": "https://bugzilla.suse.com/1245954" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38192" }, { "cve": "CVE-2025-38193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38193" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: sch_sfq: reject invalid perturb period\n\nGerrard Tai reported that SFQ perturb_period has no range check yet,\nand this can be used to trigger a race condition fixed in a separate patch.\n\nWe want to make sure ctl-\u003eperturb_period * HZ will not overflow\nand is positive.\n\n\ntc qd add dev lo root sfq perturb -10 # negative value : error\nError: sch_sfq: invalid perturb period.\n\ntc qd add dev lo root sfq perturb 1000000000 # too big : error\nError: sch_sfq: invalid perturb period.\n\ntc qd add dev lo root sfq perturb 2000000 # acceptable value\ntc -s -d qd sh dev lo\nqdisc sfq 8005: root refcnt 2 limit 127p quantum 64Kb depth 127 flows 128 divisor 1024 perturb 2000000sec\n Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)\n backlog 0b 0p requeues 0", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38193", "url": "https://www.suse.com/security/cve/CVE-2025-38193" }, { "category": "external", "summary": "SUSE Bug 1245945 for CVE-2025-38193", "url": "https://bugzilla.suse.com/1245945" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38193" }, { "cve": "CVE-2025-38198", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38198" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: Make sure modelist not set on unregistered console\n\nIt looks like attempting to write to the \"store_modes\" sysfs node will\nrun afoul of unregistered consoles:\n\nUBSAN: array-index-out-of-bounds in drivers/video/fbdev/core/fbcon.c:122:28\nindex -1 is out of range for type \u0027fb_info *[32]\u0027\n...\n fbcon_info_from_console+0x192/0x1a0 drivers/video/fbdev/core/fbcon.c:122\n fbcon_new_modelist+0xbf/0x2d0 drivers/video/fbdev/core/fbcon.c:3048\n fb_new_modelist+0x328/0x440 drivers/video/fbdev/core/fbmem.c:673\n store_modes+0x1c9/0x3e0 drivers/video/fbdev/core/fbsysfs.c:113\n dev_attr_store+0x55/0x80 drivers/base/core.c:2439\n\nstatic struct fb_info *fbcon_registered_fb[FB_MAX];\n...\nstatic signed char con2fb_map[MAX_NR_CONSOLES];\n...\nstatic struct fb_info *fbcon_info_from_console(int console)\n...\n return fbcon_registered_fb[con2fb_map[console]];\n\nIf con2fb_map contains a -1 things go wrong here. Instead, return NULL,\nas callers of fbcon_info_from_console() are trying to compare against\nexisting \"info\" pointers, so error handling should kick in correctly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38198", "url": "https://www.suse.com/security/cve/CVE-2025-38198" }, { "category": "external", "summary": "SUSE Bug 1245952 for CVE-2025-38198", "url": "https://bugzilla.suse.com/1245952" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38198" }, { "cve": "CVE-2025-38200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38200" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: fix MMIO write access to an invalid page in i40e_clear_hw\n\nWhen the device sends a specific input, an integer underflow can occur, leading\nto MMIO write access to an invalid page.\n\nPrevent the integer underflow by changing the type of related variables.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38200", "url": "https://www.suse.com/security/cve/CVE-2025-38200" }, { "category": "external", "summary": "SUSE Bug 1246045 for CVE-2025-38200", "url": "https://bugzilla.suse.com/1246045" }, { "category": "external", "summary": "SUSE Bug 1246046 for CVE-2025-38200", "url": "https://bugzilla.suse.com/1246046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38200" }, { "cve": "CVE-2025-38211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38211" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/iwcm: Fix use-after-free of work objects after cm_id destruction\n\nThe commit 59c68ac31e15 (\"iw_cm: free cm_id resources on the last\nderef\") simplified cm_id resource management by freeing cm_id once all\nreferences to the cm_id were removed. The references are removed either\nupon completion of iw_cm event handlers or when the application destroys\nthe cm_id. This commit introduced the use-after-free condition where\ncm_id_private object could still be in use by event handler works during\nthe destruction of cm_id. The commit aee2424246f9 (\"RDMA/iwcm: Fix a\nuse-after-free related to destroying CM IDs\") addressed this use-after-\nfree by flushing all pending works at the cm_id destruction.\n\nHowever, still another use-after-free possibility remained. It happens\nwith the work objects allocated for each cm_id_priv within\nalloc_work_entries() during cm_id creation, and subsequently freed in\ndealloc_work_entries() once all references to the cm_id are removed.\nIf the cm_id\u0027s last reference is decremented in the event handler work,\nthe work object for the work itself gets removed, and causes the use-\nafter-free BUG below:\n\n BUG: KASAN: slab-use-after-free in __pwq_activate_work+0x1ff/0x250\n Read of size 8 at addr ffff88811f9cf800 by task kworker/u16:1/147091\n\n CPU: 2 UID: 0 PID: 147091 Comm: kworker/u16:1 Not tainted 6.15.0-rc2+ #27 PREEMPT(voluntary)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014\n Workqueue: 0x0 (iw_cm_wq)\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6a/0x90\n print_report+0x174/0x554\n ? __virt_addr_valid+0x208/0x430\n ? __pwq_activate_work+0x1ff/0x250\n kasan_report+0xae/0x170\n ? __pwq_activate_work+0x1ff/0x250\n __pwq_activate_work+0x1ff/0x250\n pwq_dec_nr_in_flight+0x8c5/0xfb0\n process_one_work+0xc11/0x1460\n ? __pfx_process_one_work+0x10/0x10\n ? assign_work+0x16c/0x240\n worker_thread+0x5ef/0xfd0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x3b0/0x770\n ? __pfx_kthread+0x10/0x10\n ? rcu_is_watching+0x11/0xb0\n ? _raw_spin_unlock_irq+0x24/0x50\n ? rcu_is_watching+0x11/0xb0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x30/0x70\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\n\n Allocated by task 147416:\n kasan_save_stack+0x2c/0x50\n kasan_save_track+0x10/0x30\n __kasan_kmalloc+0xa6/0xb0\n alloc_work_entries+0xa9/0x260 [iw_cm]\n iw_cm_connect+0x23/0x4a0 [iw_cm]\n rdma_connect_locked+0xbfd/0x1920 [rdma_cm]\n nvme_rdma_cm_handler+0x8e5/0x1b60 [nvme_rdma]\n cma_cm_event_handler+0xae/0x320 [rdma_cm]\n cma_work_handler+0x106/0x1b0 [rdma_cm]\n process_one_work+0x84f/0x1460\n worker_thread+0x5ef/0xfd0\n kthread+0x3b0/0x770\n ret_from_fork+0x30/0x70\n ret_from_fork_asm+0x1a/0x30\n\n Freed by task 147091:\n kasan_save_stack+0x2c/0x50\n kasan_save_track+0x10/0x30\n kasan_save_free_info+0x37/0x60\n __kasan_slab_free+0x4b/0x70\n kfree+0x13a/0x4b0\n dealloc_work_entries+0x125/0x1f0 [iw_cm]\n iwcm_deref_id+0x6f/0xa0 [iw_cm]\n cm_work_handler+0x136/0x1ba0 [iw_cm]\n process_one_work+0x84f/0x1460\n worker_thread+0x5ef/0xfd0\n kthread+0x3b0/0x770\n ret_from_fork+0x30/0x70\n ret_from_fork_asm+0x1a/0x30\n\n Last potentially related work creation:\n kasan_save_stack+0x2c/0x50\n kasan_record_aux_stack+0xa3/0xb0\n __queue_work+0x2ff/0x1390\n queue_work_on+0x67/0xc0\n cm_event_handler+0x46a/0x820 [iw_cm]\n siw_cm_upcall+0x330/0x650 [siw]\n siw_cm_work_handler+0x6b9/0x2b20 [siw]\n process_one_work+0x84f/0x1460\n worker_thread+0x5ef/0xfd0\n kthread+0x3b0/0x770\n ret_from_fork+0x30/0x70\n ret_from_fork_asm+0x1a/0x30\n\nThis BUG is reproducible by repeating the blktests test case nvme/061\nfor the rdma transport and the siw driver.\n\nTo avoid the use-after-free of cm_id_private work objects, ensure that\nthe last reference to the cm_id is decremented not in the event handler\nworks, but in the cm_id destruction context. For that purpose, mo\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38211", "url": "https://www.suse.com/security/cve/CVE-2025-38211" }, { "category": "external", "summary": "SUSE Bug 1246008 for CVE-2025-38211", "url": "https://bugzilla.suse.com/1246008" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38211" }, { "cve": "CVE-2025-38212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38212" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipc: fix to protect IPCS lookups using RCU\n\nsyzbot reported that it discovered a use-after-free vulnerability, [0]\n\n[0]: https://lore.kernel.org/all/67af13f8.050a0220.21dd3.0038.GAE@google.com/\n\nidr_for_each() is protected by rwsem, but this is not enough. If it is\nnot protected by RCU read-critical region, when idr_for_each() calls\nradix_tree_node_free() through call_rcu() to free the radix_tree_node\nstructure, the node will be freed immediately, and when reading the next\nnode in radix_tree_for_each_slot(), the already freed memory may be read.\n\nTherefore, we need to add code to make sure that idr_for_each() is\nprotected within the RCU read-critical region when we call it in\nshm_destroy_orphaned().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38212", "url": "https://www.suse.com/security/cve/CVE-2025-38212" }, { "category": "external", "summary": "SUSE Bug 1246029 for CVE-2025-38212", "url": "https://bugzilla.suse.com/1246029" }, { "category": "external", "summary": "SUSE Bug 1246030 for CVE-2025-38212", "url": "https://bugzilla.suse.com/1246030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "important" } ], "title": "CVE-2025-38212" }, { "cve": "CVE-2025-38213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38213" } ], "notes": [ { "category": "general", "text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38213", "url": "https://www.suse.com/security/cve/CVE-2025-38213" }, { "category": "external", "summary": "SUSE Bug 1246037 for CVE-2025-38213", "url": "https://bugzilla.suse.com/1246037" }, { "category": "external", "summary": "SUSE Bug 1246039 for CVE-2025-38213", "url": "https://bugzilla.suse.com/1246039" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38213" }, { "cve": "CVE-2025-38222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38222" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: inline: fix len overflow in ext4_prepare_inline_data\n\nWhen running the following code on an ext4 filesystem with inline_data\nfeature enabled, it will lead to the bug below.\n\n fd = open(\"file1\", O_RDWR | O_CREAT | O_TRUNC, 0666);\n ftruncate(fd, 30);\n pwrite(fd, \"a\", 1, (1UL \u003c\u003c 40) + 5UL);\n\nThat happens because write_begin will succeed as when\next4_generic_write_inline_data calls ext4_prepare_inline_data, pos + len\nwill be truncated, leading to ext4_prepare_inline_data parameter to be 6\ninstead of 0x10000000006.\n\nThen, later when write_end is called, we hit:\n\n BUG_ON(pos + len \u003e EXT4_I(inode)-\u003ei_inline_size);\n\nat ext4_write_inline_data.\n\nFix it by using a loff_t type for the len parameter in\next4_prepare_inline_data instead of an unsigned int.\n\n[ 44.545164] ------------[ cut here ]------------\n[ 44.545530] kernel BUG at fs/ext4/inline.c:240!\n[ 44.545834] Oops: invalid opcode: 0000 [#1] SMP NOPTI\n[ 44.546172] CPU: 3 UID: 0 PID: 343 Comm: test Not tainted 6.15.0-rc2-00003-g9080916f4863 #45 PREEMPT(full) 112853fcebfdb93254270a7959841d2c6aa2c8bb\n[ 44.546523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 44.546523] RIP: 0010:ext4_write_inline_data+0xfe/0x100\n[ 44.546523] Code: 3c 0e 48 83 c7 48 48 89 de 5b 41 5c 41 5d 41 5e 41 5f 5d e9 e4 fa 43 01 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc 0f 0b \u003c0f\u003e 0b 0f 1f 44 00 00 55 41 57 41 56 41 55 41 54 53 48 83 ec 20 49\n[ 44.546523] RSP: 0018:ffffb342008b79a8 EFLAGS: 00010216\n[ 44.546523] RAX: 0000000000000001 RBX: ffff9329c579c000 RCX: 0000010000000006\n[ 44.546523] RDX: 000000000000003c RSI: ffffb342008b79f0 RDI: ffff9329c158e738\n[ 44.546523] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000\n[ 44.546523] R10: 00007ffffffff000 R11: ffffffff9bd0d910 R12: 0000006210000000\n[ 44.546523] R13: fffffc7e4015e700 R14: 0000010000000005 R15: ffff9329c158e738\n[ 44.546523] FS: 00007f4299934740(0000) GS:ffff932a60179000(0000) knlGS:0000000000000000\n[ 44.546523] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 44.546523] CR2: 00007f4299a1ec90 CR3: 0000000002886002 CR4: 0000000000770eb0\n[ 44.546523] PKRU: 55555554\n[ 44.546523] Call Trace:\n[ 44.546523] \u003cTASK\u003e\n[ 44.546523] ext4_write_inline_data_end+0x126/0x2d0\n[ 44.546523] generic_perform_write+0x17e/0x270\n[ 44.546523] ext4_buffered_write_iter+0xc8/0x170\n[ 44.546523] vfs_write+0x2be/0x3e0\n[ 44.546523] __x64_sys_pwrite64+0x6d/0xc0\n[ 44.546523] do_syscall_64+0x6a/0xf0\n[ 44.546523] ? __wake_up+0x89/0xb0\n[ 44.546523] ? xas_find+0x72/0x1c0\n[ 44.546523] ? next_uptodate_folio+0x317/0x330\n[ 44.546523] ? set_pte_range+0x1a6/0x270\n[ 44.546523] ? filemap_map_pages+0x6ee/0x840\n[ 44.546523] ? ext4_setattr+0x2fa/0x750\n[ 44.546523] ? do_pte_missing+0x128/0xf70\n[ 44.546523] ? security_inode_post_setattr+0x3e/0xd0\n[ 44.546523] ? ___pte_offset_map+0x19/0x100\n[ 44.546523] ? handle_mm_fault+0x721/0xa10\n[ 44.546523] ? do_user_addr_fault+0x197/0x730\n[ 44.546523] ? do_syscall_64+0x76/0xf0\n[ 44.546523] ? arch_exit_to_user_mode_prepare+0x1e/0x60\n[ 44.546523] ? irqentry_exit_to_user_mode+0x79/0x90\n[ 44.546523] entry_SYSCALL_64_after_hwframe+0x55/0x5d\n[ 44.546523] RIP: 0033:0x7f42999c6687\n[ 44.546523] Code: 48 89 fa 4c 89 df e8 58 b3 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 \u003c5b\u003e c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff\n[ 44.546523] RSP: 002b:00007ffeae4a7930 EFLAGS: 00000202 ORIG_RAX: 0000000000000012\n[ 44.546523] RAX: ffffffffffffffda RBX: 00007f4299934740 RCX: 00007f42999c6687\n[ 44.546523] RDX: 0000000000000001 RSI: 000055ea6149200f RDI: 0000000000000003\n[ 44.546523] RBP: 00007ffeae4a79a0 R08: 0000000000000000 R09: 0000000000000000\n[ 44.546523] R10: 0000010000000005 R11: 0000000000000202 R12: 0000\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38222", "url": "https://www.suse.com/security/cve/CVE-2025-38222" }, { "category": "external", "summary": "SUSE Bug 1245976 for CVE-2025-38222", "url": "https://bugzilla.suse.com/1245976" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38222" }, { "cve": "CVE-2025-38249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38249" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3()\n\nIn snd_usb_get_audioformat_uac3(), the length value returned from\nsnd_usb_ctl_msg() is used directly for memory allocation without\nvalidation. This length is controlled by the USB device.\n\nThe allocated buffer is cast to a uac3_cluster_header_descriptor\nand its fields are accessed without verifying that the buffer\nis large enough. If the device returns a smaller than expected\nlength, this leads to an out-of-bounds read.\n\nAdd a length check to ensure the buffer is large enough for\nuac3_cluster_header_descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38249", "url": "https://www.suse.com/security/cve/CVE-2025-38249" }, { "category": "external", "summary": "SUSE Bug 1246171 for CVE-2025-38249", "url": "https://bugzilla.suse.com/1246171" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38249" }, { "cve": "CVE-2025-38250", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38250" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: Fix use-after-free in vhci_flush()\n\nsyzbot reported use-after-free in vhci_flush() without repro. [0]\n\nFrom the splat, a thread close()d a vhci file descriptor while\nits device was being used by iotcl() on another thread.\n\nOnce the last fd refcnt is released, vhci_release() calls\nhci_unregister_dev(), hci_free_dev(), and kfree() for struct\nvhci_data, which is set to hci_dev-\u003edev-\u003edriver_data.\n\nThe problem is that there is no synchronisation after unlinking\nhdev from hci_dev_list in hci_unregister_dev(). There might be\nanother thread still accessing the hdev which was fetched before\nthe unlink operation.\n\nWe can use SRCU for such synchronisation.\n\nLet\u0027s run hci_dev_reset() under SRCU and wait for its completion\nin hci_unregister_dev().\n\nAnother option would be to restore hci_dev-\u003edestruct(), which was\nremoved in commit 587ae086f6e4 (\"Bluetooth: Remove unused\nhci-destruct cb\"). However, this would not be a good solution, as\nwe should not run hci_unregister_dev() while there are in-flight\nioctl() requests, which could lead to another data-race KCSAN splat.\n\nNote that other drivers seem to have the same problem, for exmaple,\nvirtbt_remove().\n\n[0]:\nBUG: KASAN: slab-use-after-free in skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline]\nBUG: KASAN: slab-use-after-free in skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937\nRead of size 8 at addr ffff88807cb8d858 by task syz.1.219/6718\n\nCPU: 1 UID: 0 PID: 6718 Comm: syz.1.219 Not tainted 6.16.0-rc1-syzkaller-00196-g08207f42d3ff #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0xd2/0x2b0 mm/kasan/report.c:521\n kasan_report+0x118/0x150 mm/kasan/report.c:634\n skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline]\n skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937\n skb_queue_purge include/linux/skbuff.h:3368 [inline]\n vhci_flush+0x44/0x50 drivers/bluetooth/hci_vhci.c:69\n hci_dev_do_reset net/bluetooth/hci_core.c:552 [inline]\n hci_dev_reset+0x420/0x5c0 net/bluetooth/hci_core.c:592\n sock_do_ioctl+0xd9/0x300 net/socket.c:1190\n sock_ioctl+0x576/0x790 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fcf5b98e929\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fcf5c7b9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007fcf5bbb6160 RCX: 00007fcf5b98e929\nRDX: 0000000000000000 RSI: 00000000400448cb RDI: 0000000000000009\nRBP: 00007fcf5ba10b39 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 0000000000000000 R14: 00007fcf5bbb6160 R15: 00007ffd6353d528\n \u003c/TASK\u003e\n\nAllocated by task 6535:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359\n kmalloc_noprof include/linux/slab.h:905 [inline]\n kzalloc_noprof include/linux/slab.h:1039 [inline]\n vhci_open+0x57/0x360 drivers/bluetooth/hci_vhci.c:635\n misc_open+0x2bc/0x330 drivers/char/misc.c:161\n chrdev_open+0x4c9/0x5e0 fs/char_dev.c:414\n do_dentry_open+0xdf0/0x1970 fs/open.c:964\n vfs_open+0x3b/0x340 fs/open.c:1094\n do_open fs/namei.c:3887 [inline]\n path_openat+0x2ee5/0x3830 fs/name\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38250", "url": "https://www.suse.com/security/cve/CVE-2025-38250" }, { "category": "external", "summary": "SUSE Bug 1246182 for CVE-2025-38250", "url": "https://bugzilla.suse.com/1246182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38250" }, { "cve": "CVE-2025-38264", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38264" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: sanitize request list handling\n\nValidate the request in nvme_tcp_handle_r2t() to ensure it\u0027s not part of\nany list, otherwise a malicious R2T PDU might inject a loop in request\nlist processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38264", "url": "https://www.suse.com/security/cve/CVE-2025-38264" }, { "category": "external", "summary": "SUSE Bug 1246387 for CVE-2025-38264", "url": "https://bugzilla.suse.com/1246387" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38264" }, { "cve": "CVE-2025-38312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38312" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod()\n\nIn fb_find_mode_cvt(), iff mode-\u003erefresh somehow happens to be 0x80000000,\ncvt.f_refresh will become 0 when multiplying it by 2 due to overflow. It\u0027s\nthen passed to fb_cvt_hperiod(), where it\u0027s used as a divider -- division\nby 0 will result in kernel oops. Add a sanity check for cvt.f_refresh to\navoid such overflow...\n\nFound by Linux Verification Center (linuxtesting.org) with the Svace static\nanalysis tool.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38312", "url": "https://www.suse.com/security/cve/CVE-2025-38312" }, { "category": "external", "summary": "SUSE Bug 1246386 for CVE-2025-38312", "url": "https://bugzilla.suse.com/1246386" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38312" }, { "cve": "CVE-2025-38319", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38319" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table\n\nThe function atomctrl_initialize_mc_reg_table() and\natomctrl_initialize_mc_reg_table_v2_2() does not check the return\nvalue of smu_atom_get_data_table(). If smu_atom_get_data_table()\nfails to retrieve vram_info, it returns NULL which is later\ndereferenced.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38319", "url": "https://www.suse.com/security/cve/CVE-2025-38319" }, { "category": "external", "summary": "SUSE Bug 1246243 for CVE-2025-38319", "url": "https://bugzilla.suse.com/1246243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38319" }, { "cve": "CVE-2025-38323", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38323" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atm: add lec_mutex\n\nsyzbot found its way in net/atm/lec.c, and found an error path\nin lecd_attach() could leave a dangling pointer in dev_lec[].\n\nAdd a mutex to protect dev_lecp[] uses from lecd_attach(),\nlec_vcc_attach() and lec_mcast_attach().\n\nFollowing patch will use this mutex for /proc/net/atm/lec.\n\nBUG: KASAN: slab-use-after-free in lecd_attach net/atm/lec.c:751 [inline]\nBUG: KASAN: slab-use-after-free in lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008\nRead of size 8 at addr ffff88807c7b8e68 by task syz.1.17/6142\n\nCPU: 1 UID: 0 PID: 6142 Comm: syz.1.17 Not tainted 6.16.0-rc1-syzkaller-00239-g08215f5486ec #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0xcd/0x680 mm/kasan/report.c:521\n kasan_report+0xe0/0x110 mm/kasan/report.c:634\n lecd_attach net/atm/lec.c:751 [inline]\n lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008\n do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n sock_do_ioctl+0x118/0x280 net/socket.c:1190\n sock_ioctl+0x227/0x6b0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl fs/ioctl.c:893 [inline]\n __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n \u003c/TASK\u003e\n\nAllocated by task 6132:\n kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __do_kmalloc_node mm/slub.c:4328 [inline]\n __kvmalloc_node_noprof+0x27b/0x620 mm/slub.c:5015\n alloc_netdev_mqs+0xd2/0x1570 net/core/dev.c:11711\n lecd_attach net/atm/lec.c:737 [inline]\n lane_ioctl+0x17db/0x23e0 net/atm/lec.c:1008\n do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n sock_do_ioctl+0x118/0x280 net/socket.c:1190\n sock_ioctl+0x227/0x6b0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl fs/ioctl.c:893 [inline]\n __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 6132:\n kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:576\n poison_slab_object mm/kasan/common.c:247 [inline]\n __kasan_slab_free+0x51/0x70 mm/kasan/common.c:264\n kasan_slab_free include/linux/kasan.h:233 [inline]\n slab_free_hook mm/slub.c:2381 [inline]\n slab_free mm/slub.c:4643 [inline]\n kfree+0x2b4/0x4d0 mm/slub.c:4842\n free_netdev+0x6c5/0x910 net/core/dev.c:11892\n lecd_attach net/atm/lec.c:744 [inline]\n lane_ioctl+0x1ce8/0x23e0 net/atm/lec.c:1008\n do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n sock_do_ioctl+0x118/0x280 net/socket.c:1190\n sock_ioctl+0x227/0x6b0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl fs/ioctl.c:893 [inline]\n __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38323", "url": "https://www.suse.com/security/cve/CVE-2025-38323" }, { "category": "external", "summary": "SUSE Bug 1246473 for CVE-2025-38323", "url": "https://bugzilla.suse.com/1246473" }, { "category": "external", "summary": "SUSE Bug 1246525 for CVE-2025-38323", "url": "https://bugzilla.suse.com/1246525" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "important" } ], "title": "CVE-2025-38323" }, { "cve": "CVE-2025-38337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38337" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata()\n\nSince handle-\u003eh_transaction may be a NULL pointer, so we should change it\nto call is_handle_aborted(handle) first before dereferencing it.\n\nAnd the following data-race was reported in my fuzzer:\n\n==================================================================\nBUG: KCSAN: data-race in jbd2_journal_dirty_metadata / jbd2_journal_dirty_metadata\n\nwrite to 0xffff888011024104 of 4 bytes by task 10881 on cpu 1:\n jbd2_journal_dirty_metadata+0x2a5/0x770 fs/jbd2/transaction.c:1556\n __ext4_handle_dirty_metadata+0xe7/0x4b0 fs/ext4/ext4_jbd2.c:358\n ext4_do_update_inode fs/ext4/inode.c:5220 [inline]\n ext4_mark_iloc_dirty+0x32c/0xd50 fs/ext4/inode.c:5869\n __ext4_mark_inode_dirty+0xe1/0x450 fs/ext4/inode.c:6074\n ext4_dirty_inode+0x98/0xc0 fs/ext4/inode.c:6103\n....\n\nread to 0xffff888011024104 of 4 bytes by task 10880 on cpu 0:\n jbd2_journal_dirty_metadata+0xf2/0x770 fs/jbd2/transaction.c:1512\n __ext4_handle_dirty_metadata+0xe7/0x4b0 fs/ext4/ext4_jbd2.c:358\n ext4_do_update_inode fs/ext4/inode.c:5220 [inline]\n ext4_mark_iloc_dirty+0x32c/0xd50 fs/ext4/inode.c:5869\n __ext4_mark_inode_dirty+0xe1/0x450 fs/ext4/inode.c:6074\n ext4_dirty_inode+0x98/0xc0 fs/ext4/inode.c:6103\n....\n\nvalue changed: 0x00000000 -\u003e 0x00000001\n==================================================================\n\nThis issue is caused by missing data-race annotation for jh-\u003eb_modified.\nTherefore, the missing annotation needs to be added.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38337", "url": "https://www.suse.com/security/cve/CVE-2025-38337" }, { "category": "external", "summary": "SUSE Bug 1246253 for CVE-2025-38337", "url": "https://bugzilla.suse.com/1246253" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38337" }, { "cve": "CVE-2025-38350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38350" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Always pass notifications when child class becomes empty\n\nCertain classful qdiscs may invoke their classes\u0027 dequeue handler on an\nenqueue operation. This may unexpectedly empty the child qdisc and thus\nmake an in-flight class passive via qlen_notify(). Most qdiscs do not\nexpect such behaviour at this point in time and may re-activate the\nclass eventually anyways which will lead to a use-after-free.\n\nThe referenced fix commit attempted to fix this behavior for the HFSC\ncase by moving the backlog accounting around, though this turned out to\nbe incomplete since the parent\u0027s parent may run into the issue too.\nThe following reproducer demonstrates this use-after-free:\n\n tc qdisc add dev lo root handle 1: drr\n tc filter add dev lo parent 1: basic classid 1:1\n tc class add dev lo parent 1: classid 1:1 drr\n tc qdisc add dev lo parent 1:1 handle 2: hfsc def 1\n tc class add dev lo parent 2: classid 2:1 hfsc rt m1 8 d 1 m2 0\n tc qdisc add dev lo parent 2:1 handle 3: netem\n tc qdisc add dev lo parent 3:1 handle 4: blackhole\n\n echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888\n tc class delete dev lo classid 1:1\n echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888\n\nSince backlog accounting issues leading to a use-after-frees on stale\nclass pointers is a recurring pattern at this point, this patch takes\na different approach. Instead of trying to fix the accounting, the patch\nensures that qdisc_tree_reduce_backlog always calls qlen_notify when\nthe child qdisc is empty. This solves the problem because deletion of\nqdiscs always involves a call to qdisc_reset() and / or\nqdisc_purge_queue() which ultimately resets its qlen to 0 thus causing\nthe following qdisc_tree_reduce_backlog() to report to the parent. Note\nthat this may call qlen_notify on passive classes multiple times. This\nis not a problem after the recent patch series that made all the\nclassful qdiscs qlen_notify() handlers idempotent.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38350", "url": "https://www.suse.com/security/cve/CVE-2025-38350" }, { "category": "external", "summary": "SUSE Bug 1246781 for CVE-2025-38350", "url": "https://bugzilla.suse.com/1246781" }, { "category": "external", "summary": "SUSE Bug 1247043 for CVE-2025-38350", "url": "https://bugzilla.suse.com/1247043" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "important" } ], "title": "CVE-2025-38350" }, { "cve": "CVE-2025-38375", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38375" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-net: ensure the received length does not exceed allocated size\n\nIn xdp_linearize_page, when reading the following buffers from the ring,\nwe forget to check the received length with the true allocate size. This\ncan lead to an out-of-bound read. This commit adds that missing check.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38375", "url": "https://www.suse.com/security/cve/CVE-2025-38375" }, { "category": "external", "summary": "SUSE Bug 1247177 for CVE-2025-38375", "url": "https://bugzilla.suse.com/1247177" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38375" }, { "cve": "CVE-2025-38391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38391" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: altmodes/displayport: do not index invalid pin_assignments\n\nA poorly implemented DisplayPort Alt Mode port partner can indicate\nthat its pin assignment capabilities are greater than the maximum\nvalue, DP_PIN_ASSIGN_F. In this case, calls to pin_assignment_show\nwill cause a BRK exception due to an out of bounds array access.\n\nPrevent for loop in pin_assignment_show from accessing\ninvalid values in pin_assignments by adding DP_PIN_ASSIGN_MAX\nvalue in typec_dp.h and using i \u003c DP_PIN_ASSIGN_MAX as a loop\ncondition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38391", "url": "https://www.suse.com/security/cve/CVE-2025-38391" }, { "category": "external", "summary": "SUSE Bug 1247181 for CVE-2025-38391", "url": "https://bugzilla.suse.com/1247181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38391" }, { "cve": "CVE-2025-38403", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38403" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/vmci: Clear the vmci transport packet properly when initializing it\n\nIn vmci_transport_packet_init memset the vmci_transport_packet before\npopulating the fields to avoid any uninitialised data being left in the\nstructure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38403", "url": "https://www.suse.com/security/cve/CVE-2025-38403" }, { "category": "external", "summary": "SUSE Bug 1247141 for CVE-2025-38403", "url": "https://bugzilla.suse.com/1247141" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38403" }, { "cve": "CVE-2025-38415", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38415" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: check return result of sb_min_blocksize\n\nSyzkaller reports an \"UBSAN: shift-out-of-bounds in squashfs_bio_read\" bug.\n\nSyzkaller forks multiple processes which after mounting the Squashfs\nfilesystem, issues an ioctl(\"/dev/loop0\", LOOP_SET_BLOCK_SIZE, 0x8000). \nNow if this ioctl occurs at the same time another process is in the\nprocess of mounting a Squashfs filesystem on /dev/loop0, the failure\noccurs. When this happens the following code in squashfs_fill_super()\nfails.\n\n----\nmsblk-\u003edevblksize = sb_min_blocksize(sb, SQUASHFS_DEVBLK_SIZE);\nmsblk-\u003edevblksize_log2 = ffz(~msblk-\u003edevblksize);\n----\n\nsb_min_blocksize() returns 0, which means msblk-\u003edevblksize is set to 0.\n\nAs a result, ffz(~msblk-\u003edevblksize) returns 64, and msblk-\u003edevblksize_log2\nis set to 64.\n\nThis subsequently causes the\n\nUBSAN: shift-out-of-bounds in fs/squashfs/block.c:195:36\nshift exponent 64 is too large for 64-bit type \u0027u64\u0027 (aka\n\u0027unsigned long long\u0027)\n\nThis commit adds a check for a 0 return by sb_min_blocksize().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38415", "url": "https://www.suse.com/security/cve/CVE-2025-38415" }, { "category": "external", "summary": "SUSE Bug 1247147 for CVE-2025-38415", "url": "https://bugzilla.suse.com/1247147" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38415" }, { "cve": "CVE-2025-38420", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38420" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: carl9170: do not ping device which has failed to load firmware\n\nSyzkaller reports [1, 2] crashes caused by an attempts to ping\nthe device which has failed to load firmware. Since such a device\ndoesn\u0027t pass \u0027ieee80211_register_hw()\u0027, an internal workqueue\nmanaged by \u0027ieee80211_queue_work()\u0027 is not yet created and an\nattempt to queue work on it causes null-ptr-deref.\n\n[1] https://syzkaller.appspot.com/bug?extid=9a4aec827829942045ff\n[2] https://syzkaller.appspot.com/bug?extid=0d8afba53e8fb2633217", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38420", "url": "https://www.suse.com/security/cve/CVE-2025-38420" }, { "category": "external", "summary": "SUSE Bug 1247279 for CVE-2025-38420", "url": "https://bugzilla.suse.com/1247279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38420" }, { "cve": "CVE-2025-38468", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38468" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree\n\nhtb_lookup_leaf has a BUG_ON that can trigger with the following:\n\ntc qdisc del dev lo root\ntc qdisc add dev lo root handle 1: htb default 1\ntc class add dev lo parent 1: classid 1:1 htb rate 64bit\ntc qdisc add dev lo parent 1:1 handle 2: netem\ntc qdisc add dev lo parent 2:1 handle 3: blackhole\nping -I lo -c1 -W0.001 127.0.0.1\n\nThe root cause is the following:\n\n1. htb_dequeue calls htb_dequeue_tree which calls the dequeue handler on\n the selected leaf qdisc\n2. netem_dequeue calls enqueue on the child qdisc\n3. blackhole_enqueue drops the packet and returns a value that is not\n just NET_XMIT_SUCCESS\n4. Because of this, netem_dequeue calls qdisc_tree_reduce_backlog, and\n since qlen is now 0, it calls htb_qlen_notify -\u003e htb_deactivate -\u003e\n htb_deactiviate_prios -\u003e htb_remove_class_from_row -\u003e htb_safe_rb_erase\n5. As this is the only class in the selected hprio rbtree,\n __rb_change_child in __rb_erase_augmented sets the rb_root pointer to\n NULL\n6. Because blackhole_dequeue returns NULL, netem_dequeue returns NULL,\n which causes htb_dequeue_tree to call htb_lookup_leaf with the same\n hprio rbtree, and fail the BUG_ON\n\nThe function graph for this scenario is shown here:\n 0) | htb_enqueue() {\n 0) + 13.635 us | netem_enqueue();\n 0) 4.719 us | htb_activate_prios();\n 0) # 2249.199 us | }\n 0) | htb_dequeue() {\n 0) 2.355 us | htb_lookup_leaf();\n 0) | netem_dequeue() {\n 0) + 11.061 us | blackhole_enqueue();\n 0) | qdisc_tree_reduce_backlog() {\n 0) | qdisc_lookup_rcu() {\n 0) 1.873 us | qdisc_match_from_root();\n 0) 6.292 us | }\n 0) 1.894 us | htb_search();\n 0) | htb_qlen_notify() {\n 0) 2.655 us | htb_deactivate_prios();\n 0) 6.933 us | }\n 0) + 25.227 us | }\n 0) 1.983 us | blackhole_dequeue();\n 0) + 86.553 us | }\n 0) # 2932.761 us | qdisc_warn_nonwc();\n 0) | htb_lookup_leaf() {\n 0) | BUG_ON();\n ------------------------------------------\n\nThe full original bug report can be seen here [1].\n\nWe can fix this just by returning NULL instead of the BUG_ON,\nas htb_dequeue_tree returns NULL when htb_lookup_leaf returns\nNULL.\n\n[1] https://lore.kernel.org/netdev/pF5XOOIim0IuEfhI-SOxTgRvNoDwuux7UHKnE_Y5-zVd4wmGvNk2ceHjKb8ORnzw0cGwfmVu42g9dL7XyJLf1NEzaztboTWcm0Ogxuojoeo=@willsroot.io/", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38468", "url": "https://www.suse.com/security/cve/CVE-2025-38468" }, { "category": "external", "summary": "SUSE Bug 1247437 for CVE-2025-38468", "url": "https://bugzilla.suse.com/1247437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "moderate" } ], "title": "CVE-2025-38468" }, { "cve": "CVE-2025-38477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38477" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix race condition on qfq_aggregate\n\nA race condition can occur when \u0027agg\u0027 is modified in qfq_change_agg\n(called during qfq_enqueue) while other threads access it\nconcurrently. For example, qfq_dump_class may trigger a NULL\ndereference, and qfq_delete_class may cause a use-after-free.\n\nThis patch addresses the issue by:\n\n1. Moved qfq_destroy_class into the critical section.\n\n2. Added sch_tree_lock protection to qfq_dump_class and\nqfq_dump_class_stats.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38477", "url": "https://www.suse.com/security/cve/CVE-2025-38477" }, { "category": "external", "summary": "SUSE Bug 1247314 for CVE-2025-38477", "url": "https://bugzilla.suse.com/1247314" }, { "category": "external", "summary": "SUSE Bug 1247315 for CVE-2025-38477", "url": "https://bugzilla.suse.com/1247315" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "important" } ], "title": "CVE-2025-38477" }, { "cve": "CVE-2025-38494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38494" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: do not bypass hid_hw_raw_request\n\nhid_hw_raw_request() is actually useful to ensure the provided buffer\nand length are valid. Directly calling in the low level transport driver\nfunction bypassed those checks and allowed invalid paramto be used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38494", "url": "https://www.suse.com/security/cve/CVE-2025-38494" }, { "category": "external", "summary": "SUSE Bug 1247349 for CVE-2025-38494", "url": "https://bugzilla.suse.com/1247349" }, { "category": "external", "summary": "SUSE Bug 1247350 for CVE-2025-38494", "url": "https://bugzilla.suse.com/1247350" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "important" } ], "title": "CVE-2025-38494" }, { "cve": "CVE-2025-38495", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38495" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: ensure the allocated report buffer can contain the reserved report ID\n\nWhen the report ID is not used, the low level transport drivers expect\nthe first byte to be 0. However, currently the allocated buffer not\naccount for that extra byte, meaning that instead of having 8 guaranteed\nbytes for implement to be working, we only have 7.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38495", "url": "https://www.suse.com/security/cve/CVE-2025-38495" }, { "category": "external", "summary": "SUSE Bug 1247348 for CVE-2025-38495", "url": "https://bugzilla.suse.com/1247348" }, { "category": "external", "summary": "SUSE Bug 1247351 for CVE-2025-38495", "url": "https://bugzilla.suse.com/1247351" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_269-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.269.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.269.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.269.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T15:47:45Z", "details": "important" } ], "title": "CVE-2025-38495" } ] }
icsa-25-226-07
Vulnerability from csaf_cisa
Published
2025-08-12 00:00
Modified
2025-08-12 00:00
Summary
Siemens Third-Party Components in SINEC OS
Notes
Summary
SINEC OS before V3.2 contains third-party components with multiple vulnerabilities.
Siemens has released new versions for the affected products and recommends to update to the latest versions.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Advisory Conversion Disclaimer
This ICSA is a verbatim republication of Siemens ProductCERT SSA-355557 from a direct conversion of the vendor's Common Security Advisory Framework (CSAF) advisory. This is republished to CISA's website as a means of increasing visibility and is provided "as-is" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.
Critical infrastructure sectors
Critical Manufacturing, Transportation Systems, Energy, Healthcare and Public Health, Financial Services, Government Services and Facilities
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.
Recommended Practices
Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.
Recommended Practices
Locate control system networks and remote devices behind firewalls and isolate them from business networks.
Recommended Practices
When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SINEC OS before V3.2 contains third-party components with multiple vulnerabilities.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-355557 from a direct conversion of the vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Critical Manufacturing, Transportation Systems, Energy, Healthcare and Public Health, Financial Services, Government Services and Facilities", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-355557.json" }, { "category": "self", "summary": "SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-355557.html" }, { "category": "self", "summary": "ICS Advisory ICSA-25-226-07 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-226-07.json" }, { "category": "self", "summary": "ICS Advisory ICSA-25-226-07 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens Third-Party Components in SINEC OS", "tracking": { "current_release_date": "2025-08-12T00:00:00.000000Z", "generator": { "date": "2025-08-14T20:56:35.814106Z", "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-25-226-07", "initial_release_date": "2025-08-12T00:00:00.000000Z", "revision_history": [ { "date": "2025-08-12T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003c3.2", "product": { "name": "RUGGEDCOM RST2428P (6GK6242-6PA00)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6GK6242-6PA00" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RST2428P (6GK6242-6PA00)" }, { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003c3.2", "product": { "name": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family" }, { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003c3.2", "product": { "name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-47316", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfsd: NULL dereference in nfs3svc_encode_getaclres.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2021-47316" }, { "cve": "CVE-2022-48666", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "scsi: core: use-after-free vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2022-48666" }, { "cve": "CVE-2022-48827", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "NFSD: vulnerability caused by loff_t overflow on the server when a client reads near the maximum offset, causing the server to return an EINVAL error, which the client retries indefinitely, instead of handling out-of-range READ requests by returning a short result with an EOF flag.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2022-48827" }, { "cve": "CVE-2022-48828", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NFSD: Vulnerability caused by an underflow in ia_size due to a mismatch between signed and unsigned 64-bit file size values, which can cause issues when handling large file sizes from NFS clients.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2022-48828" }, { "cve": "CVE-2022-48829", "cwe": { "id": "CWE-253", "name": "Incorrect Check of Function Return Value" }, "notes": [ { "category": "summary", "text": "NFSD: Vulnerability handling large file sizes for NFSv3 improperly capping client size values larger than s64_max, leading to unexpected behavior and potential data corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2022-48829" }, { "cve": "CVE-2022-49034", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "sh: cpuinfo: warning for CONFIG_CPUMASK_OFFSTACK. When CONFIG_CPUMASK_OFFSTACK and CONFIG_DEBUG_PER_CPU_MAPS are selected, cpu_max_bits_warn() generates a runtime warning when showing /proc/cpuinfo.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2022-49034" }, { "cve": "CVE-2023-52887", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: can: j1939: vulnerability related to error handling for closely received RTS messages in xtp_rx_rts_session_new, which is addressed by replacing less informative backtraces with a new method that provides clearer error messages and allows for early termination of problematic sessions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2023-52887" }, { "cve": "CVE-2023-52917", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir(). The debugfs_create_dir() function returns error pointers. It never returns NULL. So use IS_ERR() to check it.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2023-52917" }, { "cve": "CVE-2024-9681", "cwe": { "id": "CWE-697", "name": "Incorrect Comparison" }, "notes": [ { "category": "summary", "text": "When curl is asked to use HSTS, the expiry time for a subdomain might\r\noverwrite a parent domain\u0027s cache entry, making it end sooner or later than\r\notherwise intended.\r\n\r\nThis affects curl using applications that enable HSTS and use URLs with the\r\ninsecure `HTTP://` scheme and perform transfers with hosts like\r\n`x.example.com` as well as `example.com` where the first host is a subdomain\r\nof the second host.\r\n\r\n(The HSTS cache either needs to have been populated manually or there needs to\r\nhave been previous HTTPS accesses done as the cache needs to have entries for\r\nthe domains involved to trigger this problem.)\r\n\r\nWhen `x.example.com` responds with `Strict-Transport-Security:` headers, this\r\nbug can make the subdomain\u0027s expiry timeout *bleed over* and get set for the\r\nparent domain `example.com` in curl\u0027s HSTS cache.\r\n\r\nThe result of a triggered bug is that HTTP accesses to `example.com` get\r\nconverted to HTTPS for a different period of time than what was asked for by\r\nthe origin server. If `example.com` for example stops supporting HTTPS at its\r\nexpiry time, curl might then fail to access `http://example.com` until the\r\n(wrongly set) timeout expires. This bug can also expire the parent\u0027s entry\r\n*earlier*, thus making curl inadvertently switch back to insecure HTTP earlier\r\nthan otherwise intended.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-9681" }, { "cve": "CVE-2024-36484", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: relax socket state check at accept time.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-36484" }, { "cve": "CVE-2024-36894", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-36894" }, { "cve": "CVE-2024-36901", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a chance that ip6_dst_idev() returns NULL in ip6_output().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-36901" }, { "cve": "CVE-2024-36938", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Denial of Service Vulnerability in the Linux Kernel: bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue Fix NULL pointer data-races in sk_psock_skb_ingress_enqueue() which syzbot reported.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-36938" }, { "cve": "CVE-2024-36974", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP. If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev-\u003enum_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-36974" }, { "cve": "CVE-2024-36978", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: sched: sch_multiq: possible OOB write in multiq_tune() q-\u003ebands will be assigned to qopt-\u003ebands to execute subsequent code logic after kmalloc. So the old q-\u003ebands should not be used in kmalloc. Otherwise, an out-of-bounds write will occur.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-36978" }, { "cve": "CVE-2024-37078", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: kernel vulnerability due to lack of writeback flag waiting. When the log writer starts a writeback for segment summary blocks or a super root block that use the backing devices page cache, it does not wait for the ongoing folio/page writeback, resulting in an inconsistent writeback state.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-37078" }, { "cve": "CVE-2024-38586", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "r8169: possible ring buffer corruption on fragmented Tx packets. Vulnerability on the RTL8125b when transmitting small fragmented packets, whereby invalid entries were inserted into the transmit ring buffer, subsequently leading to calls to dma_unmap_single() with a null address. This was caused by rtl8169_start_xmit() not noticing changes to nr_frags which may occur when small packets are padded (to work around hardware quirks) in rtl8169_tso_csum_v2().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-38586" }, { "cve": "CVE-2024-38619", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb-storage: alauda: Check whether the media is initialized. The member \"uzonesize\" of struct alauda_info will remain 0 if alauda_init_media() fails, potentially causing divide errors in alauda_read_data() and alauda_write_lba().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-38619" }, { "cve": "CVE-2024-39468", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "smb: client: Deadlock in smb2_find_smb_tcon().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-39468" }, { "cve": "CVE-2024-39469", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors The error handling in nilfs_empty_dir() when a directory folio/page read fails is incorrect, as in the old ext2 implementation, and if the folio/page cannot be read or nilfs_check_folio() fails, it will falsely determine the directory as empty and corrupt the file system. In addition, since nilfs_empty_dir() does not immediately return on a failed folio/page read, but continues to loop, this can cause a long loop with I/O if i_size of the directory\u0027s inode is also corrupted, causing the log writer thread to wait and hang, as reported by syzbot. Fix these issues by making nilfs_empty_dir() immediately return a false value (0) if it fails to get a directory folio/page.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-39469" }, { "cve": "CVE-2024-39482", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bcache: Variable length array abuse in btree_iter.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-39482" }, { "cve": "CVE-2024-39484", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "mmc: davinci: Vulnerability from resource leaks. Using __exit for the remove function results in the remove callback being discarded with CONFIG_MMC_DAVINCI=y. When such a device gets unbound (e.g. using sysfs or hotplug), the driver is just removed without the cleanup being performed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-39484" }, { "cve": "CVE-2024-39487", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-39487" }, { "cve": "CVE-2024-39495", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "greybus: use-after-free vulnerability in gb_interface_release due to race condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-39495" }, { "cve": "CVE-2024-39499", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "vmci: speculation leaks by sanitizing event in event_deliver(). event_msg is controlled by user-space, event_msg-\u003eevent_data.event is passed to event_deliver() and used as an index without sanitization, leading to information leaks.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-39499" }, { "cve": "CVE-2024-39501", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drivers: core: synchronize really_probe() and dev_uevent(). Synchronize the dev-\u003edriver usage in really_probe() and dev_uevent(). These can run in different threads, what can result in the following race condition for dev-\u003edriver uninitialization.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-39501" }, { "cve": "CVE-2024-39502", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "ionic: use after netif_napi_del(). When queues are started, netif_napi_add() and napi_enable() are called. If there are 4 queues and only 3 queues are used for the current configuration, only 3 queues\u0027 napi should be registered and enabled. The ionic_qcq_enable() checks whether the .poll pointer is not NULL for enabling only the using queue\u0027 napi. Unused queues\u0027 napi will not be registered by netif_napi_add(), so the .poll pointer indicates NULL. But it couldn\u0027t distinguish whether the napi was unregistered or not because netif_napi_del() doesn\u0027t reset the .poll pointer to NULL. So, ionic_qcq_enable() calls napi_enable() for the queue, which was unregistered by netif_napi_del().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-39502" }, { "cve": "CVE-2024-39503", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "netfilter: ipset: race between namespace cleanup and gc in the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-39503" }, { "cve": "CVE-2024-39505", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/komeda: check for error-valued pointer. komeda_pipeline_get_state() may return an error-valued pointer, thus check the pointer for negative or null value before dereferencing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-39505" }, { "cve": "CVE-2024-39506", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet. In lio_vf_rep_copy_packet() pg_info-\u003epage is compared to a NULL value, but then it is unconditionally passed to skb_add_rx_frag(), which could lead to null pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-39506" }, { "cve": "CVE-2024-39509", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "HID: core: remove unnecessary WARN_ON() in implement(). There is a warning in a call to implement() when trying to write a value into a field of smaller size in an output report. Since implement() already has a warn message printed out with the help of hid_warn() and value in question gets trimmed with: ... value \u0026= m; ... WARN_ON may be considered superfluous.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-39509" }, { "cve": "CVE-2024-40901", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40901" }, { "cve": "CVE-2024-40902", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "jfs: xattr: buffer overflow for invalid xattr. When an xattr size is not what is expected, it is printed out to the kernel log in hex format as a form of debugging. But when that xattr size is bigger than the expected size, printing it out can cause an access off the end of the buffer.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40902" }, { "cve": "CVE-2024-40904", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "USB: class: cdc-wdm: CPU lockup caused by excessive log messages.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40904" }, { "cve": "CVE-2024-40905", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ipv6: possible race in __fib6_drop_pcpu_from().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40905" }, { "cve": "CVE-2024-40912", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: mac80211: deadlock in ieee80211_sta_ps_deliver_wakeup().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40912" }, { "cve": "CVE-2024-40916", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found When reading EDID fails and driver reports no modes available, the DRM core adds an artificial 1024x786 mode to the connector.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40916" }, { "cve": "CVE-2024-40929", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: iwlwifi: mvm: check n_ssids before accessing the ssids.In some versions of cfg80211, the ssids poinet might be a valid one even though n_ssids is 0. Accessing the pointer in this case will cuase an out-of-bound access.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40929" }, { "cve": "CVE-2024-40931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mptcp: ensure snd_una is properly initialized on connect.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40931" }, { "cve": "CVE-2024-40932", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/exynos/vidi: memory leak in .get_modes().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40932" }, { "cve": "CVE-2024-40934", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() Fix a memory leak on logi_dj_recv_send_report() error path.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40934" }, { "cve": "CVE-2024-40941", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "wifi: iwlwifi: mvm: don\u0027t read past the mfuart notifcation. In case the firmware sends a notification that claims it has more data than it has, it will read past that was allocated for the notification.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40941" }, { "cve": "CVE-2024-40942", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "notes": [ { "category": "summary", "text": "wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects The hwmp code use objects of type mesh_preq_queue, added to a list in ieee80211_if_mesh, to keep track of mpath we need to resolve. If the mpath gets deleted, ex mesh interface is removed, the entries in that list will never get cleaned.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40942" }, { "cve": "CVE-2024-40943", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "ocfs2: fix races between hole punching and AIO+DIO.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40943" }, { "cve": "CVE-2024-40945", "cwe": { "id": "CWE-393", "name": "Return of Wrong Status Code" }, "notes": [ { "category": "summary", "text": "iommu: Return right value in iommu_sva_bind_device() iommu_sva_bind_device() should return either a sva bond handle or an ERR_PTR value in error cases. Existing drivers (idxd and uacce) only check the return value with IS_ERR(). This could potentially lead to a kernel NULL pointer dereference issue if the function returns NULL instead of an error pointer. In reality, this doesn\u0027t cause any problems because iommu_sva_bind_device() only returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40945" }, { "cve": "CVE-2024-40947", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ima: Avoid blocking in RCU read-side critical section, a panic happens in ima_match_policy.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40947" }, { "cve": "CVE-2024-40958", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "netns: Make get_net_ns() handle zero refcount net Syzkaller hit a warning: refcount_t: addition on 0; use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40958" }, { "cve": "CVE-2024-40959", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40959" }, { "cve": "CVE-2024-40960", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ipv6: prevent possible NULL dereference in rt6_probe() syzbot caught a NULL dereference in rt6_probe() [1] Bail out if __in6_dev_get() returns NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40960" }, { "cve": "CVE-2024-40961", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ipv6: prevent possible NULL deref in fib6_nh_init() syzbot reminds us that in6_dev_get() can return NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40961" }, { "cve": "CVE-2024-40963", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mips: bmips: BCM6358: Some device have CBR address set to 0 causing kernel panic when arch_sync_dma_for_cpu_all is called.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40963" }, { "cve": "CVE-2024-40968", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "MIPS:The standard PCIe configuration read-write interface is used to access the configuration space of the peripheral PCIe devices of the mips processor after the PCIe link surprise down, it can generate kernel panic caused by \"Data bus error\".", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40968" }, { "cve": "CVE-2024-40971", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "f2fs: remove clear SB_INLINECRYPT flag in default_options In f2fs_remount, SB_INLINECRYPT flag will be clear and re-set. If create new file or open file during this gap, these files will not use inlinecrypt. Worse case, it may lead to data corruption if wrappedkey_v0 is enable.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40971" }, { "cve": "CVE-2024-40974", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "powerpc/pseries: stack corruption at runtime when plpar_hcall9() stores results past the end of the array.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40974" }, { "cve": "CVE-2024-40976", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/lima: There is a race condition in which a rendering job might take just long enough to trigger the drm sched job timeout handler but also still complete before the hard reset is done by the timeout handler. This runs into race conditions not expected by the timeout handler. In some very specific cases it currently may result in a refcount imbalance on lima_pm_idle, with a stack dump.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40976" }, { "cve": "CVE-2024-40978", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: qedi: crash while reading debugfs attribute. The qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly on a __user pointer, which results into the crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40978" }, { "cve": "CVE-2024-40980", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drop_monitor: replace spin_lock by raw_spin_lock trace_drop_common() is called with preemption disabled, and it acquires a spin_lock. This is problematic for RT kernels because spin_locks are sleeping locks in this configuration, which causes the following splat.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40980" }, { "cve": "CVE-2024-40981", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "batman-adv: empty buckets in batadv_purge_orig_ref() are pointing to soft lockups in batadv_purge_orig_ref().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40981" }, { "cve": "CVE-2024-40983", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tipc: possible crash before doing decryption.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40983" }, { "cve": "CVE-2024-40984", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ACPICA: Revert \"ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40984" }, { "cve": "CVE-2024-40987", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: UBSAN warning in kv_dpm.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40987" }, { "cve": "CVE-2024-40988", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/radeon: UBSAN warning in kv_dpm.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40988" }, { "cve": "CVE-2024-40990", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ptp: integer overflow in max_vclocks_store.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40990" }, { "cve": "CVE-2024-40995", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net/sched: act_api: possible infinite loop in tcf_idr_check_alloc().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-40995" }, { "cve": "CVE-2024-41000", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "block/ioctl: prefer different overflow check Running syzkaller with the newly reintroduced signed integer overflow sanitizer.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41000" }, { "cve": "CVE-2024-41004", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tracing: Build event generation tests only as modules The kprobes and synth event generation test modules add events and lock (get a reference) those event file reference in module init function, and unlock and delete it in module exit function. This is because those are designed for playing as modules. If we make those modules as built-in, those events are left locked in the kernel, and never be removed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41004" }, { "cve": "CVE-2024-41005", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "netpoll: race condition in netpoll_owner_active KCSAN detected a race condition in netpoll.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41005" }, { "cve": "CVE-2024-41006", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "netrom: a memory leak in nr_heartbeat_expiry().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41006" }, { "cve": "CVE-2024-41007", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "notes": [ { "category": "summary", "text": "tcp: avoid too many retransmit packets If a TCP socket is using TCP_USER_TIMEOUT.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41007" }, { "cve": "CVE-2024-41009", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "bpf: Fix overrunning reservations in ringbuf.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41009" }, { "cve": "CVE-2024-41012", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "filelock: Remove locks reliably when fcntl/close race is detected When fcntl_setlk() races with close(), it removes the created lock with do_lock_file_wait().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41012" }, { "cve": "CVE-2024-41015", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: add bounds checking to ocfs2_check_dir_entry(). This adds sanity checks for ocfs2_dir_entry to make sure all members of ocfs2_dir_entry don\u0027t stray beyond valid memory region.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41015" }, { "cve": "CVE-2024-41017", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jfs: vulnerability involves the risk of accessing memory beyond the end of ealist, which can lead to undefined behavior or crashes.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41017" }, { "cve": "CVE-2024-41020", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "filelock: race condition vulnerability between fcntl and close operations, which can lead to issues in the recovery compatibility path.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41020" }, { "cve": "CVE-2024-41022", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability involves a signedness problem in sdma_v4_0_process_trap_irq(), which can lead to incorrect handling of values and potential errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41022" }, { "cve": "CVE-2024-41034", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: kernel bug on rename operation of broken directory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41034" }, { "cve": "CVE-2024-41035", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "USB: core: duplicate endpoint bug.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41035" }, { "cve": "CVE-2024-41040", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net/sched: UAF when resolving a clash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41040" }, { "cve": "CVE-2024-41041", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "udp: small race window.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41041" }, { "cve": "CVE-2024-41044", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ppp: claimed-as-LCP but actually malformed packets.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41044" }, { "cve": "CVE-2024-41046", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix double free in detach The number of the currently released descriptor is never incremented which results in the same skb being released multiple times.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41046" }, { "cve": "CVE-2024-41049", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: filelock: fix potential use-after-free in posix_lock_inode Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode(). The request pointer had been changed earlier to point to a lock entry that was added to the inode\u0027s list. However, before the tracepoint could fire, another task raced in and freed that lock. Fix this by moving the tracepoint inside the spinlock, which should ensure that this doesn\u0027t happen.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41049" }, { "cve": "CVE-2024-41055", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: mm: prevent derefencing NULL ptr in pfn_section_valid() Commit 5ec8e8ea8b77 (\"mm/sparsemem: fix race in accessing memory_section-\u003eusage\") changed pfn_section_valid() to add a READ_ONCE() call around \"ms-\u003eusage\" to fix a race with section_deactivate() where ms-\u003eusage can be cleared. The READ_ONCE() call, by itself, is not enough to prevent NULL pointer dereference. We need to check its value before dereferencing it.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41055" }, { "cve": "CVE-2024-41059", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hfsplus: uninit-value in copy_name.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41059" }, { "cve": "CVE-2024-41063", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Bluetooth: hci_core: deadlock at destroy_workqueue().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41063" }, { "cve": "CVE-2024-41064", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "powerpc/eeh: possible crash when edev-\u003epdev changes.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41064" }, { "cve": "CVE-2024-41065", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "powerpc/pseries: Reading the dispatch trace log from /sys/kernel/debug/powerpc/dtl/cpu-* results in a BUG().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41065" }, { "cve": "CVE-2024-41068", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "s390/sclp: sclp_init() failure.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41068" }, { "cve": "CVE-2024-41070", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "KVM: PPC: Book3S HV: UAF in kvm_spapr_tce_attach_iommu_group().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41070" }, { "cve": "CVE-2024-41072", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check In \u0027cfg80211_wext_siwscan()\u0027, add extra check whether number of channels passed via \u0027ioctl(sock, SIOCSIWSCAN, ...)\u0027 doesn\u0027t exceed IW_MAX_FREQUENCIES and reject invalid request with -EINVAL otherwise.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41072" }, { "cve": "CVE-2024-41077", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "null_blk: validation error on block size.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41077" }, { "cve": "CVE-2024-41078", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "btrfs: qgroup: quota root leak after quota disable failure.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41078" }, { "cve": "CVE-2024-41081", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ila: block BH in ila_output().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41081" }, { "cve": "CVE-2024-41087", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ata: libata-core: double free on error.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41087" }, { "cve": "CVE-2024-41089", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/nouveau/dispnv04: null pointer dereference in nv17_tv_get_hd_modes.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41089" }, { "cve": "CVE-2024-41090", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tap: add missing verification for short frame. Missing to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tap_get_user_xdp()--\u003eskb_set_network_header() may assume the size is more than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41090" }, { "cve": "CVE-2024-41091", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tun: add missing verification for short frame. Missing to check against the validity of the frame length in the tun_xdp_one() path could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tun_xdp_one--\u003eeth_type_trans() may access the Ethernet header although it can be less than ETH_HLEN. Once transmitted, this could either causeout-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41091" }, { "cve": "CVE-2024-41092", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/i915/gt: potential UAF by revoke of fence registers.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41092" }, { "cve": "CVE-2024-41095", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/nouveau/dispnv04: null pointer dereference in nv17_tv_get_ld_modes.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41095" }, { "cve": "CVE-2024-41097", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: atm: cxacru: incomplete endpoint checking in cxacru_bind().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-41097" }, { "cve": "CVE-2024-42076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: can: j1939: unused data in j1939_send_one().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42076" }, { "cve": "CVE-2024-42077", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: DIO failure due to insufficient transaction credits.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42077" }, { "cve": "CVE-2024-42082", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "xdp: unused WARN() in __xdp_reg_mem_model().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42082" }, { "cve": "CVE-2024-42084", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ftruncate: passing a negative length accidentally succeeds in truncating to file size between 2GiB and 4GiB.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42084" }, { "cve": "CVE-2024-42086", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "iio: chemical: bme680: overflows in compensate() functions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42086" }, { "cve": "CVE-2024-42087", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/panel: ilitek-ili9881c: warning with GPIO controllers.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42087" }, { "cve": "CVE-2024-42092", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "gpio: davinci: There can be out of chips-\u003eirqs array boundaries access in davinci_gpio_probe().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42092" }, { "cve": "CVE-2024-42093", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net/dpaa2: explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack can cause potential stack overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42093" }, { "cve": "CVE-2024-42094", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net/iucv: explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack can cause potential stack overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42094" }, { "cve": "CVE-2024-42095", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "serial: 8250_omap: Erroneous timeout can be triggered, and it may lead to storm of interrupts.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42095" }, { "cve": "CVE-2024-42101", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/nouveau: null pointer dereference in nouveau_connector_get_modes.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42101" }, { "cve": "CVE-2024-42105", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42105" }, { "cve": "CVE-2024-42143", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "orangefs: out-of-bounds fsid access.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42143" }, { "cve": "CVE-2024-42145", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "IB/core: an unbounded UMAD receive list, poses a risk of uncontrolled growth.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42145" }, { "cve": "CVE-2024-42148", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bnx2x: multiple UBSAN array-index-out-of-bounds.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42148" }, { "cve": "CVE-2024-42152", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nvmet: possible leak when destroy a ctrl during qp establishment.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42152" }, { "cve": "CVE-2024-42153", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "i2c: pnx: potential deadlock warning from del_timer_sync() call in isr.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42153" }, { "cve": "CVE-2024-42154", "cwe": { "id": "CWE-805", "name": "Buffer Access with Incorrect Length Value" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don\u0027t see anything checking that TCP_METRICS_ATTR_SADDR_IPV4 is at least 4 bytes long, and the policy doesn\u0027t have an entry for this attribute at all (neither does it for IPv6 but v6 is manually validated).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42154" }, { "cve": "CVE-2024-42161", "cwe": { "id": "CWE-457", "name": "Use of Uninitialized Variable" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42161" }, { "cve": "CVE-2024-42223", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: dvb-frontends: tda10048: integer overflow state-\u003extal_hz can be up to 16M, so it can overflow a 32 bit integer when multiplied by pll_mfactor.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42223" }, { "cve": "CVE-2024-42224", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: dsa: mv88e6xxx: wrong check on empty list.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42224" }, { "cve": "CVE-2024-42229", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "crypto: aead,cipher - key buffer after use not zeroized.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42229" }, { "cve": "CVE-2024-42232", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "libceph: fix race between delayed_work() and ceph_monc_stop() The way the delayed work is handled in ceph_monc_stop() is prone to races with mon_fault() and possibly also finish_hunting(). Both of these can requeue the delayed work which wouldn\u0027t be canceled by any of the following code in case that happens after cancel_delayed_work_sync() runs -- __close_session() doesn\u0027t mess with the delayed work in order to avoid interfering with the hunting interval logic. This part was missed in(libceph: behave in mon_fault() if cur_mon \u003c \") and use-after-free can still ensue on monc and objects that hang off of it, with monc-\u003e auth and monc-\u003emonmap being particularly susceptible to quickly being reused.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42232" }, { "cve": "CVE-2024-42236", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: gadget: configfs: OOB read/write in usb_string_copy().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42236" }, { "cve": "CVE-2024-42244", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "notes": [ { "category": "summary", "text": "USB: serial: mos7840: fix crash on resume Since(\"USB: serial: use generic method if no alternative is provided in usb serial layer\"), USB serial core calls the generic resume implementation when the driver has not provided one. This can trigger a crash on resume with mos7840 since support for multiple read URBs was added back in 2011. Specifically, both port read URBs are now submitted on resume for open ports, but the context pointer of the second URB is left set to the core rather than mos7840 port structure.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42244" }, { "cve": "CVE-2024-42247", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wireguard: allowedips: unaligned 64-bit memory accesses.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-42247" }, { "cve": "CVE-2024-43098", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "i3c: Use i3cdev-\u003edesc-\u003einfo instead of calling i3c_device_get_info() to avoid deadlock. A deadlock may happen since the i3c_master_register() acquires i3cbus-\u003elock twice.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-43098" }, { "cve": "CVE-2024-43861", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: usb: qmi_wwan: memory leak for not ip packets.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-43861" }, { "cve": "CVE-2024-43867", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/nouveau: prime: refcount underflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-43867" }, { "cve": "CVE-2024-43871", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu() It will cause memory leakage when use driver API devm_free_percpu() to free memory allocated by devm_alloc_percpu(), fixed by using devres_release() instead of devres_destroy() within devm_free_percpu().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-43871" }, { "cve": "CVE-2024-43879", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: cfg80211: Currently NL80211_RATE_INFO_HE_RU_ALLOC_2x996 is not handled in cfg80211_calculate_bitrate_he(), leading to warning.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-43879" }, { "cve": "CVE-2024-43880", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mlxsw: spectrum_acl_erp: object nesting warning.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-43880" }, { "cve": "CVE-2024-43882", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "exec: the execution may gain unintended privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-43882" }, { "cve": "CVE-2024-43883", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: vhci-hcd: vulnerability due to the vhci-hcd driver dropping references before new ones were gained, potentially leading to the use of stale pointers.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-43883" }, { "cve": "CVE-2024-43889", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "padata: vulnerability due to a possible divide-by-zero error in padata_mt_helper() during bootup, caused by an uninitialized chunk_size being zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-43889" }, { "cve": "CVE-2024-43890", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tracing: vulnerability due to an overflow in get_free_elt(), which could lead to infinite loops and CPU hangs when the tracing map becomes full.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-43890" }, { "cve": "CVE-2024-43893", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "serial: core: vulnerability due to a missing check for uartclk being zero, leading to a potential divide-by-zero error when calling ioctl TIOCSSERIAL with an invalid baud_base.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-43893" }, { "cve": "CVE-2024-43894", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/client: vulnerability due to a potential null pointer dereference in drm_client_modeset_probe() when drm_mode_duplicate() fails, which was fixed by adding a check.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-43894" }, { "cve": "CVE-2024-43907", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu/pm: null pointer dereference in apply_state_adjust_rules.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-43907" }, { "cve": "CVE-2024-43908", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: null pointer dereference in ras_manager.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-43908" }, { "cve": "CVE-2024-43914", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "md/raid5: BUG_ON() while continue reshape after reassembling.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-43914" }, { "cve": "CVE-2024-44935", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "sctp: Fix null-ptr-deref in reuseport_add_sock(). A Null Pointer Dereference in reuseport_add_sock() while accessing sk2-\u003esk_reuseport_cb . The repro first creates a listener with SO_REUSEPORT. Then, it creates another listener on the same port and concurrently closes the first listener. The second listen() calls reuseport_add_sock() with the first listener as sk2, where sk2-\u003esk_reuseport_cb is not expected to be cleared concurrently, but the close() does clear it by reuseport_detach_sock().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44935" }, { "cve": "CVE-2024-44944", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, otherwise LSB of the expectation object address is leaked to userspace.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44944" }, { "cve": "CVE-2024-44949", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "parisc: fix a possible DMA corruption ARCH_DMA_MINALIGN was defined as 16 - this is too small - it may be possible that two unrelated 16-byte allocations share a cache line. If one of these allocations is written using DMA and the other is written using cached write, the value that was written with DMA may be corrupted.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44949" }, { "cve": "CVE-2024-44952", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "driver core: vulnerability due to a potential deadlock due to improper handling of device attributes and driver detachment, which has been fixed by using synchronize_rcu() to prevent race conditions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44952" }, { "cve": "CVE-2024-44954", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: line6: vulnerability involved racy access to the midibuf in the ALSA line6 driver, which has been fixed by using a spinlock to prevent concurrent access issues.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44954" }, { "cve": "CVE-2024-44960", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: gadget: core: Check for unset descriptor. It needs to be reassured that the descriptor has been set before looking at maxpacket. This fixes a null pointer panic in this case. This may happen if the gadget doesn\u0027t properly set up the endpoint for the current speed, or the gadget descriptors are malformed and the descriptor for the speed/endpoint are not found. No current gadget driver is known to have this problem, but this may cause a hard-to-find bug during development of new gadgets.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44960" }, { "cve": "CVE-2024-44965", "cwe": { "id": "CWE-229", "name": "Improper Handling of Values" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix pti_clone_pgtable() alignment assumption Guenter reported dodgy crashes on an i386-nosmp build using GCC-11 that had the form of endless traps until entry stack exhaust and then #DF from the stack guard. It turned out that pti_clone_pgtable() had alignment assumptions on the start address, notably it hard assumes start is PMD aligned. This is true on x86_64, but very much not true on i386. These assumptions can cause the end condition to malfunction, leading to a \u0027short\u0027 clone. Guess what happens when the user mapping has a short copy of the entry text? Use the correct increment form for addr to avoid alignment assumptions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44965" }, { "cve": "CVE-2024-44969", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "s390/sclp: vulnerability could lead to data corruption if a Store Data operation is interrupted and the halt attempt fails, which was resolved by preventing the release of data buffers in such cases.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44969" }, { "cve": "CVE-2024-44971", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "net: dsa: bcm_sf2: vulnerability caused a memory leak by not decrementing the reference count after finding and removing PHY devices, which has been fixed by adding a call to phy_device_free() to balance the reference count.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44971" }, { "cve": "CVE-2024-44987", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent UAF in ip6_send_skb().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44987" }, { "cve": "CVE-2024-44988", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: dsa: mv88e6xxx: vulnerability caused an out-of-bound access in the mv88e6xxx driver due to an ATU violation causing the SPID to exceed DSA_MAX_PORTS, which was resolved by ensuring the SPID stays within the valid range.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44988" }, { "cve": "CVE-2024-44989", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: bonding: fix xfrm real_dev null pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44989" }, { "cve": "CVE-2024-44990", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: bonding: fix null pointer deref in bond_ipsec_offload_ok We must check if there is an active slave before dereferencing the pointer.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44990" }, { "cve": "CVE-2024-44995", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: hns3: a deadlock problem when config TC during resetting.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44995" }, { "cve": "CVE-2024-44998", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "atm: idt77252: use after free in dequeue_rx().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44998" }, { "cve": "CVE-2024-44999", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "gtp: missing network headers in gtp_dev_xmit().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-44999" }, { "cve": "CVE-2024-45003", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "vfs: Some filesystems(eg. ext4 with ea_inode feature, ubifs with xattr) may do inode lookup in the inode evicting callback function, if the inode lookup is operated under the inode lru traversing context, deadlock problems may happen.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-45003" }, { "cve": "CVE-2024-45006", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "xhci: Panther point NULL pointer deref at full-speed re-enumeration.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-45006" }, { "cve": "CVE-2024-45008", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Input: missing limit on max slots results in too large allocation at input_mt_init_slots().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-45008" }, { "cve": "CVE-2024-45021", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "memcg_write_event_control(): a user-triggerable oops.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-45021" }, { "cve": "CVE-2024-45025", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE copy_fd_bitmaps.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-45025" }, { "cve": "CVE-2024-46673", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "scsi: aacraid: Fix double-free on probe failure. aac_probe_one() calls hardware-specific init functions through the aac_driver_ident::init pointer, all of which eventually call down to aac_init_adapter(). If aac_init_adapter() fails after allocating memory for aac_dev::queues, it frees the memory but does not clear that member. After the hardware-specific init function returns an error, aac_probe_one() goes down an error path that frees the memory pointed to by aac_dev::queues, resulting in a double-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46673" }, { "cve": "CVE-2024-46674", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "usb: dwc3: st: fix probed platform device ref count on probe error path. The probe function never performs any paltform device allocation, thus error path \"undo_platform_dev_alloc\" is entirely bogus. It drops the reference count from the platform device being probed. If error path is triggered, this will lead to unbalanced device reference counts and premature release of device resources, thus possible use-after-free when releasing remaining devm-managed resources.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46674" }, { "cve": "CVE-2024-46675", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: dwc3: core: A vulnerability where the USB core could access an invalid event buffer address during runtime suspend, potentially causing SMMU faults and other memory issues in Exynos platforms.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46675" }, { "cve": "CVE-2024-46676", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfc: pn533: Add poll mod list filling check. In case of im_protocols value is 1 and tm_protocols value is 0 this combination successfully passes the check \u0027if (!im_protocols \u0026\u0026 !tm_protocols)\u0027 in the nfc_start_poll(). But then after pn533_poll_create_mod_list() call in pn533_start_poll() poll mod list will remain empty and dev-\u003epoll_mod_count will remain 0 which lead to division by zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46676" }, { "cve": "CVE-2024-46677", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "gtp: fix NULL pointer dereference. When sockfd_lookup() fails, gtp_encap_enable_socket() returns a NULL pointer, but its callers only check for error pointers thus miss the NULL pointer case.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46677" }, { "cve": "CVE-2024-46679", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ethtool: check device is present when getting link settings.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46679" }, { "cve": "CVE-2024-46685", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "pinctrl: single: fix NULL dereference in pcs_get_function(). pinmux_generic_get_function() can return NULL and the pointer \u0027function\u0027 was dereferenced without checking against NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46685" }, { "cve": "CVE-2024-46689", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "soc: qcom: cmd-db: Map shared memory as WC, not WB Linux does not write into cmd-db region. This region of memory is write protected by XPU. XPU may sometime falsely detect clean cache eviction as \"write\" into the write protected region leading to secure interrupt which causes an endless loop somewhere in Trust Zone.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46689" }, { "cve": "CVE-2024-46702", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "thunderbolt: Mark XDomain as unplugged when router is removed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46702" }, { "cve": "CVE-2024-46707", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 On a system with a GICv3, if a guest hasn\u0027t been configured with GICv3 and that the host is not capable of GICv2 emulation, a write to any of the ICC_*SGI*_EL1 registers is trapped to EL2.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46707" }, { "cve": "CVE-2024-46713", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "perf/aux: AUX buffer serialization.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46713" }, { "cve": "CVE-2024-46714", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Skip wbscl_set_scaler_filter if filter is null Callers can pass null in filter (i.e. from returned from the function wbscl_get_filter_coeffs_16p) and a null check is added to ensure that is not the case.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46714" }, { "cve": "CVE-2024-46719", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: typec: ucsi: Fix null pointer dereference in trace ucsi_register_altmode checks IS_ERR for the alt pointer and treats NULL as valid. When CONFIG_TYPEC_DP_ALTMODE is not enabled, ucsi_register_displayport returns NULL which causes a NULL pointer dereference in trace. Rather than return NULL, call typec_port_register_altmode to register DisplayPort alternate mode as a non-controllable mode when CONFIG_TYPEC_DP_ALTMODE is not enabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46719" }, { "cve": "CVE-2024-46721", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "apparmor: fix possible NULL pointer dereference. profile-\u003eparent-\u003edents[AAFS_PROF_DIR] could be NULL only if its parent is made from __create_missing_ancestors(..) and \u0027ent-\u003eold\u0027 is NULL in aa_replace_profiles(..). In that case, it must return an error code and the code, -ENOENT represents its state that the path of its parent is not existed yet.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46721" }, { "cve": "CVE-2024-46722", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability due to an out-of-bounds read warning when accessing mc_data[i-1].", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46722" }, { "cve": "CVE-2024-46723", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability due to an out-of-bounds read warning when accessing ucode[].", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46723" }, { "cve": "CVE-2024-46724", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability in drm/amdgpu that involved an out-of-bounds read of df_v1_7_channel_number.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46724" }, { "cve": "CVE-2024-46725", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability caused by an out-of-bounds write warning due to an unchecked ring type value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46725" }, { "cve": "CVE-2024-46731", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/pm: vulnerability caused by an out-of-bounds read warning where the index i - 1U can exceed the bounds of the mc_data[] array when i is zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46731" }, { "cve": "CVE-2024-46737", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nvmet-tcp: kernel crash if commands allocation fails.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46737" }, { "cve": "CVE-2024-46738", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "VMCI: use-after-free when removing resource in vmci_resource_remove().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46738" }, { "cve": "CVE-2024-46739", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "uio_hv_generic: kernel NULL pointer dereference in hv_uio_rescind.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46739" }, { "cve": "CVE-2024-46740", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "binder: UAF caused by offsets overwrite.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46740" }, { "cve": "CVE-2024-46743", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: of/irq: Prevent device address out-of-bounds read in interrupt map walk.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46743" }, { "cve": "CVE-2024-46744", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: Squashfs: sanity check symbolic link size.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46744" }, { "cve": "CVE-2024-46745", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: Input: uinput - reject requests with unreasonable number of slots When exercising uinput interface syzkaller may try setting up device with a really large number of slots, which causes memory allocation failure in input_mt_init_slots(). While this allocation failure is handled properly and request is rejected, it results in syzkaller reports. Additionally, such request may put undue burden on the system which will try to free a lot of memory for a bogus request. Fix it by limiting allowed number of slots to 100. This can easily be extended if we see devices that can track more than 100 contacts.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46745" }, { "cve": "CVE-2024-46747", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "HID: cougar: slab-out-of-bounds Read in cougar_report_fixup. Report_fixup for the Cougar 500k Gaming Keyboard was not verifying that the report descriptor size was correct before accessing it.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46747" }, { "cve": "CVE-2024-46750", "cwe": { "id": "CWE-413", "name": "Improper Resource Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: PCI: Add missing bridge lock to pci_bus_lock().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46750" }, { "cve": "CVE-2024-46755", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id(). mwifiex_get_priv_by_id() returns the priv pointer corresponding to the bss_num and bss_type, but without checking if the priv is actually currently in use. Unused priv pointers do not have a wiphy attached to them which can lead to NULL pointer dereferences further down the callstack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46755" }, { "cve": "CVE-2024-46756", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hwmon: (w83627ehf) underflows seen when writing limit attributes DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number such as -9223372036854775808 is provided by the user.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46756" }, { "cve": "CVE-2024-46757", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hwmon: (nct6775-core) underflows seen when writing limit attributes DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number such as -9223372036854775808 is provided by the user.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46757" }, { "cve": "CVE-2024-46758", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hwmon: (lm95234) underflows seen when writing limit attributes DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number such as -9223372036854775808 is provided by the user.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46758" }, { "cve": "CVE-2024-46759", "cwe": { "id": "CWE-124", "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: hwmon: (adc128d818) Fix underflows seen when writing limit attributes DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number such as -9223372036854775808 is provided by the user. Fix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46759" }, { "cve": "CVE-2024-46761", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "pci/hotplug/pnv_php: hotplug driver crash on Powernv.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46761" }, { "cve": "CVE-2024-46763", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "fou: null-ptr-deref in GRO.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46763" }, { "cve": "CVE-2024-46771", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "can: bcm: Remove proc entry when dev is unregistered.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46771" }, { "cve": "CVE-2024-46777", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "udf: Avoid excessive partition lengths Avoid mounting filesystems where the partition would overflow the 32-bits used for block number. Also refuse to mount filesystems where the partition length is so large we cannot safely index bits in a block bitmap.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46777" }, { "cve": "CVE-2024-46780", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: vulnerability caused by the need for mutual exclusion using nilfs-\u003ens_sem when accessing superblock buffers in sysfs attribute show methods to prevent issues with pointer dereferencing and memory access.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46780" }, { "cve": "CVE-2024-46781", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: vulnerability involves a use-after-free bug during mount-time recovery, where inodes with recovered data are not freed if an error occurs before the log writer starts, leading to potential memory issues.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46781" }, { "cve": "CVE-2024-46782", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ila: call nf_unregister_net_hooks() use-after-free Read in ila_nf_input.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46782" }, { "cve": "CVE-2024-46783", "cwe": { "id": "CWE-229", "name": "Improper Handling of Values" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: fix return value of tcp_bpf_sendmsg().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46783" }, { "cve": "CVE-2024-46791", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open The mcp251x_hw_wake() function is called with the mpc_lock mutex held and disables the interrupt handler so that no interrupts can be processed while waking the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46791" }, { "cve": "CVE-2024-46798", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ASoC: dapm: vulnerability is an use-after-free bug where snd_pcm_suspend_all() accessed a freed snd_soc_pcm_runtime object during system suspension, detected with KASAN configurations.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46798" }, { "cve": "CVE-2024-46800", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "sch/netem: use after free in netem_dequeue If netem_dequeue() enqueues packet to inner qdisc and that qdisc returns __NET_XMIT_STOLEN.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46800" }, { "cve": "CVE-2024-46804", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Add array index check for hdcp ddc access.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46804" }, { "cve": "CVE-2024-46814", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Check msg_id before processing transcation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46814" }, { "cve": "CVE-2024-46815", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[].", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46815" }, { "cve": "CVE-2024-46817", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46817" }, { "cve": "CVE-2024-46818", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Check gpio_id before used as array index.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46818" }, { "cve": "CVE-2024-46819", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: the warning dereferencing obj for nbio_v7_4 if ras_manager obj null, don\u0027t print NBIO err data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46819" }, { "cve": "CVE-2024-46822", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46822" }, { "cve": "CVE-2024-46828", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "sched: sch_cake: fix bulk flow accounting logic for host fairness In sch_cake, we keep track of the count of active bulk flows per host, when running in dst/src host fairness mode, which is used as the round-robin weight when iterating through flows.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46828" }, { "cve": "CVE-2024-46829", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "rtmutex: Drop rt_mutex::wait_lock before scheduling. rt_mutex_handle_deadlock() is called with rt_mutex::wait_lock held. In the good case it returns with the lock held and in the deadlock case it emits a warning and goes into an endless scheduling loop with the lock held, which triggers the \u0027scheduling in atomic\u0027 warning. Unlock rt_mutex::wait_lock in the dead lock case before issuing the warning and dropping into the schedule for ever loop.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46829" }, { "cve": "CVE-2024-46832", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "MIPS: cevt-r4k: Don\u0027t call get_c0_compare_int if timer irq is installed This avoids warning: [ 0.118053] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:283 Caused by get_c0_compare_int on secondary CPU. We also skipped saving IRQ number to struct clock_event_device *cd as it\u0027s never used by clockevent core, as per comments it\u0027s only meant for \"non CPU local devices\".", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46832" }, { "cve": "CVE-2024-46840", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "btrfs: clean up our handling of refs == 0 in snapshot delete. In reada we BUG_ON(refs == 0), which may be problematic because there is no lock on the extent leave, potentially leading to a transient incorrect answer. In walk_down_proc, BUG_ON(refs == 0) is also used, which could occur due to extent tree corruption. This has been changed to return -EUCLEAN. In do_walk_down() this case is caught and handled correctly, however -EIO is returned, whereas -EUCLEAN would a more appropriate error code. Finally in walk_up_proc, BUG_ON(refs == 0) is also used, it has also been converted to proper error handling.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46840" }, { "cve": "CVE-2024-46844", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "um: line: always fill *error_out in setup_one_line() The pointer isn\u0027t initialized by callers, but I have encountered cases where it\u0027s still printed; initialize it in all possible cases in setup_one_line().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-46844" }, { "cve": "CVE-2024-47143", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "dma-debug: possible deadlock on radix_lock. radix_lock() shouldn\u0027t be held while holding dma_hash_entry[idx].lock otherwise, there\u0027s a possible deadlock scenario when dma debug API is called holding rq_lock().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47143" }, { "cve": "CVE-2024-47659", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "smack: tcp: vulnerability in Smack\u2019s TCP/IPv4 labeling allows packets to be incorrectly labeled, enabling unauthorized data writing from one label to another.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47659" }, { "cve": "CVE-2024-47660", "cwe": { "id": "CWE-413", "name": "Improper Resource Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: fsnotify: clear PARENT_WATCHED flags lazily In some setups directories can have many (usually negative) dentries. Hence __fsnotify_update_child_dentry_flags() function can take a significant amount of time. Since the bulk of this function happens under inode-\u003ei_lock this causes a significant contention on the lock when we remove the watch from the directory as the __fsnotify_update_child_dentry_flags() call from fsnotify_recalc_mask() races with __fsnotify_update_child_dentry_flags() calls from __fsnotify_parent() happening on children. This can lead upto softlockup reports reported by users. Fix the problem by calling fsnotify_update_children_dentry_flags() to set PARENT_WATCHED flags only when parent starts watching children. When parent stops watching children, clear false positive PARENT_WATCHED flags lazily in __fsnotify_parent() for each accessed child.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47660" }, { "cve": "CVE-2024-47663", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "staging: iio: frequency: ad9834: In ad9834_write_frequency() clk_get_rate() can return 0. In such case ad9834_calc_freqreg() call will lead to division by zero. Checking \u0027if (fout \u003e (clk_freq / 2))\u0027 doesn\u0027t protect in case of \u0027fout\u0027 is 0. ad9834_write_frequency() is called from ad9834_write(), where fout is taken from text buffer, which can contain any value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47663" }, { "cve": "CVE-2024-47667", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "PCI: keystone: Missing workaround for Errata #i2037 (AM65x SR 1.0).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47667" }, { "cve": "CVE-2024-47668", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "lib/generic-radix-tree.c: race in __genradix_ptr_alloc().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47668" }, { "cve": "CVE-2024-47669", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: state management vulnerability in error path of log writing function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47669" }, { "cve": "CVE-2024-47679", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "vfs: race between evice_inodes() and find_inode()\u0026iput().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47679" }, { "cve": "CVE-2024-47684", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: check skb is non-NULL in tcp_rto_delta_us()\r\n\r\nWe have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic\r\nkernel that are running ceph and recently hit a null ptr dereference in\r\ntcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also\r\nsaw it getting hit from the RACK case as well. Here are examples of the oops\r\nmessages we saw in each of those cases:\r\n\r\nJul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020\r\nJul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode\r\nJul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page\r\nJul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0\r\nJul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI\r\nJul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu\r\nJul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/09/2023\r\nJul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 \u003c48\u003e 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3\r\nJul 26 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246\r\nJul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX: 20c49ba5e353f7cf RCX: 0000000000000000\r\nJul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60\r\nJul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8\r\nJul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900\r\nJul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30\r\nJul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000\r\nJul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\r\nJul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0\r\nJul 26 15:05:02 rx [11061395.913822] PKRU: 55555554\r\nJul 26 15:05:02 rx [11061395.916786] Call Trace:\r\nJul 26 15:05:02 rx [11061395.919488]\r\nJul 26 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f\r\nJul 26 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9\r\nJul 26 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380\r\nJul 26 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0\r\nJul 26 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50\r\nJul 26 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0\r\nJul 26 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20\r\nJul 26 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450\r\nJul 26 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140\r\nJul 26 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90\r\nJul 26 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0\r\nJul 26 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40\r\nJul 26 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220\r\nJul 26 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240\r\nJul 26 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0\r\nJul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240\r\nJul 26 15:05:02 rx [11061395.999866] call_timer_fn+0x32/0x130\r\nJul 26 15:05:02 rx [11061396.003782] __run_timers.part.0+0x180/0x280\r\nJul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10\r\nJul 26 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30\r\nJul 26 15:05:02 rx [11061396.017718] ? lapic_next_even\r\n---truncated---", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47684" }, { "cve": "CVE-2024-47685", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()\r\n\r\nsyzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending garbage on the four reserved tcp bits (th-\u003eres1)\r\n\r\nUse skb_put_zero() to clear the whole TCP header, as done in nf_reject_ip_tcphdr_put()\r\n\r\nBUG: KMSAN: uninit-value in nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255\r\n nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255\r\n nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344\r\n nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48\r\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\r\n nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288\r\n nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161\r\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\r\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\r\n nf_hook include/linux/netfilter.h:269 [inline]\r\n NF_HOOK include/linux/netfilter.h:312 [inline]\r\n ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310\r\n __netif_receive_skb_one_core net/core/dev.c:5661 [inline]\r\n __netif_receive_skb+0x1da/0xa00 net/core/dev.c:5775\r\n process_backlog+0x4ad/0xa50 net/core/dev.c:6108\r\n __napi_poll+0xe7/0x980 net/core/dev.c:6772\r\n napi_poll net/core/dev.c:6841 [inline]\r\n net_rx_action+0xa5a/0x19b0 net/core/dev.c:6963\r\n handle_softirqs+0x1ce/0x800 kernel/softirq.c:554\r\n __do_softirq+0x14/0x1a kernel/softirq.c:588\r\n do_softirq+0x9a/0x100 kernel/softirq.c:455\r\n __local_bh_enable_ip+0x9f/0xb0 kernel/softirq.c:382\r\n local_bh_enable include/linux/bottom_half.h:33 [inline]\r\n rcu_read_unlock_bh include/linux/rcupdate.h:908 [inline]\r\n __dev_queue_xmit+0x2692/0x5610 net/core/dev.c:4450\r\n dev_queue_xmit include/linux/netdevice.h:3105 [inline]\r\n neigh_resolve_output+0x9ca/0xae0 net/core/neighbour.c:1565\r\n neigh_output include/net/neighbour.h:542 [inline]\r\n ip6_finish_output2+0x2347/0x2ba0 net/ipv6/ip6_output.c:141\r\n __ip6_finish_output net/ipv6/ip6_output.c:215 [inline]\r\n ip6_finish_output+0xbb8/0x14b0 net/ipv6/ip6_output.c:226\r\n NF_HOOK_COND include/linux/netfilter.h:303 [inline]\r\n ip6_output+0x356/0x620 net/ipv6/ip6_output.c:247\r\n dst_output include/net/dst.h:450 [inline]\r\n NF_HOOK include/linux/netfilter.h:314 [inline]\r\n ip6_xmit+0x1ba6/0x25d0 net/ipv6/ip6_output.c:366\r\n inet6_csk_xmit+0x442/0x530 net/ipv6/inet6_connection_sock.c:135\r\n __tcp_transmit_skb+0x3b07/0x4880 net/ipv4/tcp_output.c:1466\r\n tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline]\r\n tcp_connect+0x35b6/0x7130 net/ipv4/tcp_output.c:4143\r\n tcp_v6_connect+0x1bcc/0x1e40 net/ipv6/tcp_ipv6.c:333\r\n __inet_stream_connect+0x2ef/0x1730 net/ipv4/af_inet.c:679\r\n inet_stream_connect+0x6a/0xd0 net/ipv4/af_inet.c:750\r\n __sys_connect_file net/socket.c:2061 [inline]\r\n __sys_connect+0x606/0x690 net/socket.c:2078\r\n __do_sys_connect net/socket.c:2088 [inline]\r\n __se_sys_connect net/socket.c:2085 [inline]\r\n __x64_sys_connect+0x91/0xe0 net/socket.c:2085\r\n x64_sys_call+0x27a5/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:43\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nUninit was stored to memory at:\r\n nf_reject_ip6_tcphdr_put+0x60c/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:249\r\n nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344\r\n nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48\r\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\r\n nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288\r\n nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161\r\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\r\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\r\n nf_hook include/linux/netfilter.h:269 [inline]\r\n NF_HOOK include/linux/netfilter.h:312 [inline]\r\n ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310\r\n __netif_receive_skb_one_core\r\n---truncated---", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47685" }, { "cve": "CVE-2024-47692", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfsd: return -EINVAL when namelen is 0\r\nWhen we have a corrupted main.sqlite in /var/lib/nfs/nfsdcld/, it may result in namelen being 0, which will cause memdup_user() to return ZERO_SIZE_PTR.\r\nWhen we access the name.data that has been assigned the value of ZERO_SIZE_PTR in nfs4_client_to_reclaim(), null pointer dereference is triggered.\r\n\r\n[ T1205] ==================================================================\r\n[ T1205] BUG: KASAN: null-ptr-deref in nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] Read of size 1 at addr 0000000000000010 by task nfsdcld/1205\r\n[ T1205]\r\n[ T1205] CPU: 11 PID: 1205 Comm: nfsdcld Not tainted 5.10.0-00003-g2c1423731b8d #406\r\n[ T1205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-buildvm-ppc64le-16.ppc.fedoraproject.org-3.fc31 04/01/2014\r\n[ T1205] Call Trace:\r\n[ T1205] dump_stack+0x9a/0xd0\r\n[ T1205] ? nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] __kasan_report.cold+0x34/0x84\r\n[ T1205] ? nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] kasan_report+0x3a/0x50\r\n[ T1205] nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] ? nfsd4_release_lockowner+0x410/0x410\r\n[ T1205] cld_pipe_downcall+0x5ca/0x760\r\n[ T1205] ? nfsd4_cld_tracking_exit+0x1d0/0x1d0\r\n[ T1205] ? down_write_killable_nested+0x170/0x170\r\n[ T1205] ? avc_policy_seqno+0x28/0x40\r\n[ T1205] ? selinux_file_permission+0x1b4/0x1e0\r\n[ T1205] rpc_pipe_write+0x84/0xb0\r\n[ T1205] vfs_write+0x143/0x520\r\n[ T1205] ksys_write+0xc9/0x170\r\n[ T1205] ? __ia32_sys_read+0x50/0x50\r\n[ T1205] ? ktime_get_coarse_real_ts64+0xfe/0x110\r\n[ T1205] ? ktime_get_coarse_real_ts64+0xa2/0x110\r\n[ T1205] do_syscall_64+0x33/0x40\r\n[ T1205] entry_SYSCALL_64_after_hwframe+0x67/0xd1\r\n[ T1205] RIP: 0033:0x7fdbdb761bc7\r\n[ T1205] Code: 0f 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 514\r\n[ T1205] RSP: 002b:00007fff8c4b7248 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\r\n[ T1205] RAX: ffffffffffffffda RBX: 000000000000042b RCX: 00007fdbdb761bc7\r\n[ T1205] RDX: 000000000000042b RSI: 00007fff8c4b75f0 RDI: 0000000000000008\r\n[ T1205] RBP: 00007fdbdb761bb0 R08: 0000000000000000 R09: 0000000000000001\r\n[ T1205] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000042b\r\n[ T1205] R13: 0000000000000008 R14: 00007fff8c4b75f0 R15: 0000000000000000\r\n[ T1205] ==================================================================", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47692" }, { "cve": "CVE-2024-47696", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nRDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency\r\n\r\nIn the commit aee2424246f9 (\"RDMA/iwcm: Fix a use-after-free related to destroying CM IDs\"), the function flush_workqueue is invoked to flush the work queue iwcm_wq.\r\n\r\nBut at that time, the work queue iwcm_wq was created via the function alloc_ordered_workqueue without the flag WQ_MEM_RECLAIM.\r\n\r\nBecause the current process is trying to flush the whole iwcm_wq, if iwcm_wq doesn\u0027t have the flag WQ_MEM_RECLAIM, verify that the current process is not reclaiming memory or running on a workqueue which doesn\u0027t have the flag WQ_MEM_RECLAIM as that can break forward-progress guarantee leading to a deadlock.\r\n\r\nThe call trace is as below:\r\n\r\n[ 125.350876][ T1430] Call Trace:\r\n[ 125.356281][ T1430] \u003cTASK\u003e\r\n[ 125.361285][ T1430] ? __warn (kernel/panic.c:693)\r\n[ 125.367640][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))\r\n[ 125.375689][ T1430] ? report_bug (lib/bug.c:180 lib/bug.c:219)\r\n[ 125.382505][ T1430] ? handle_bug (arch/x86/kernel/traps.c:239)\r\n[ 125.388987][ T1430] ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))\r\n[ 125.395831][ T1430] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621)\r\n[ 125.403125][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))\r\n[ 125.410984][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))\r\n[ 125.418764][ T1430] __flush_workqueue (kernel/workqueue.c:3970)\r\n[ 125.426021][ T1430] ? __pfx___might_resched (kernel/sched/core.c:10151)\r\n[ 125.433431][ T1430] ? destroy_cm_id (drivers/infiniband/core/iwcm.c:375) iw_cm\r\n[ 125.441209][ T1430] ? __pfx___flush_workqueue (kernel/workqueue.c:3910)\r\n[ 125.473900][ T1430] ? _raw_spin_lock_irqsave (arch/x86/include/asm/atomic.h:107 include/linux/atomic/atomic-arch-fallback.h:2170 include/linux/atomic/atomic-instrumented.h:1302 include/asm-generic/qspinlock.h:111 include/linux/spinlock.h:187 include/linux/spinlock_api_smp.h:111 kernel/locking/spinlock.c:162)\r\n[ 125.473909][ T1430] ? __pfx__raw_spin_lock_irqsave (kernel/locking/spinlock.c:161)\r\n[ 125.482537][ T1430] _destroy_id (drivers/infiniband/core/cma.c:2044) rdma_cm\r\n[ 125.495072][ T1430] nvme_rdma_free_queue (drivers/nvme/host/rdma.c:656 drivers/nvme/host/rdma.c:650) nvme_rdma\r\n[ 125.505827][ T1430] nvme_rdma_reset_ctrl_work (drivers/nvme/host/rdma.c:2180) nvme_rdma\r\n[ 125.505831][ T1430] process_one_work (kernel/workqueue.c:3231)\r\n[ 125.515122][ T1430] worker_thread (kernel/workqueue.c:3306 kernel/workqueue.c:3393)\r\n[ 125.515127][ T1430] ? __pfx_worker_thread (kernel/workqueue.c:3339)\r\n[ 125.531837][ T1430] kthread (kernel/kthread.c:389)\r\n[ 125.539864][ T1430] ? __pfx_kthread (kernel/kthread.c:342)\r\n[ 125.550628][ T1430] ret_from_fork (arch/x86/kernel/process.c:147)\r\n[ 125.558840][ T1430] ? __pfx_kthread (kernel/kthread.c:342)\r\n[ 125.558844][ T1430] ret_from_fork_asm (arch/x86/entry/entry_64.S:257)\r\n[ 125.566487][ T1430] \u003c/TASK\u003e\r\n[ 125.566488][ T1430] ---[ end trace 0000000000000000 ]---", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47696" }, { "cve": "CVE-2024-47697", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error\r\n\r\nEnsure index in rtl2830_pid_filter does not exceed 31 to prevent out-of-bounds access.\r\n\r\ndev-\u003efilters is a 32-bit value, so set_bit and clear_bit functions should only operate on indices from 0 to 31. If index is 32, it will attempt to access a non-existent 33rd bit, leading to out-of-bounds access.\r\nChange the boundary check from index \u003e 32 to index \u003e= 32 to resolve this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47697" }, { "cve": "CVE-2024-47698", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drivers: media: dvb-frontends/rtl2832: An out-of-bounds access occurs if rtl2832_pid_filter exceed 31, which was not verified.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47698" }, { "cve": "CVE-2024-47699", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix potential null-ptr-deref in nilfs_btree_insert()\r\n\r\nPatch series \"nilfs2: fix potential issues with empty b-tree nodes\".\r\n\r\nThis series addresses three potential issues with empty b-tree nodes that can occur with corrupted filesystem images, including one recently discovered by syzbot.\r\n\r\n\r\nThis patch (of 3):\r\n\r\nIf a b-tree is broken on the device, and the b-tree height is greater than 2 (the level of the root node is greater than 1) even if the number of child nodes of the b-tree root is 0, a NULL pointer dereference occurs in nilfs_btree_prepare_insert(), which is called from nilfs_btree_insert().\r\n\r\nThis is because, when the number of child nodes of the b-tree root is 0, nilfs_btree_do_lookup() does not set the block buffer head in any of path[x].bp_bh, leaving it as the initial value of NULL, but if the level of the b-tree root node is greater than 1, nilfs_btree_get_nonroot_node(), which accesses the buffer memory of path[x].bp_bh, is called.\r\n\r\nFix this issue by adding a check to nilfs_btree_root_broken(), which performs sanity checks when reading the root node from the device, to detect this inconsistency.\r\n\r\nThanks to Lizhi Xu for trying to solve the bug and clarifying the cause early on.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47699" }, { "cve": "CVE-2024-47701", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid OOB when system.data xattr changes underneath the filesystem.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47701" }, { "cve": "CVE-2024-47705", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblock: fix potential invalid pointer dereference in blk_add_partition\r\n\r\nThe blk_add_partition() function initially used a single if-condition (IS_ERR(part)) to check for errors when adding a partition. This was modified to handle the specific case of -ENXIO separately, allowing the function to proceed without logging the error in this case. However, this change unintentionally left a path where md_autodetect_dev() could be called without confirming that part is a valid pointer.\r\n\r\nThis commit separates the error handling logic by splitting the initial if-condition, improving code readability and handling specific error scenarios explicitly. The function now distinguishes the general error case from -ENXIO without altering the existing behavior of md_autodetect_dev() calls.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47705" }, { "cve": "CVE-2024-47706", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblock, bfq: fix possible UAF for bfqq-\u003ebic with merge chain\r\n\r\nIn this case, IO from Process 1 will get bfqq2 from BIC1 first, and then\r\nget bfqq3 through merge chain, and finially handle IO by bfqq3.\r\nHowerver, current code will think bfqq2 is owned by BIC1, like initial\r\nstate, and set bfqq2-\u003ebic to BIC1.\r\n\r\nAllocated by task 20776:\r\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\r\n kasan_set_track+0x25/0x30 mm/kasan/common.c:52\r\n __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328\r\n kasan_slab_alloc include/linux/kasan.h:188 [inline]\r\n slab_post_alloc_hook mm/slab.h:763 [inline]\r\n slab_alloc_node mm/slub.c:3458 [inline]\r\n kmem_cache_alloc_node+0x1a4/0x6f0 mm/slub.c:3503\r\n ioc_create_icq block/blk-ioc.c:370 [inline]\r\n---truncated---", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47706" }, { "cve": "CVE-2024-47709", "cwe": { "id": "CWE-825", "name": "Expired Pointer Dereference" }, "notes": [ { "category": "summary", "text": "can: bcm: A warning is triggered when connect() is issued again for a socket whose connect()ed device has been unregistered. However, if the socket is just close()d without the 2nd connect(), the remaining bo-\u003ebcm_proc_read triggers unnecessary remove_proc_entry() in bcm_release().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47709" }, { "cve": "CVE-2024-47710", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "sock_map: vulnerability result of adding a cond_resched() in sock_hash_free() to prevent CPU soft lockups when destroying maps with a large number of buckets.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47710" }, { "cve": "CVE-2024-47712", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "wifi: wilc1000: vulnerability caused by a potential RCU dereference issue in wilc_parse_join_bss_param by storing the TSF value in a local variable before releasing the RCU lock to prevent use-after-free errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47712" }, { "cve": "CVE-2024-47713", "cwe": { "id": "CWE-664", "name": "Improper Control of a Resource Through its Lifetime" }, "notes": [ { "category": "summary", "text": "wifi: mac80211: vulnerability caused by implementing a two-phase skb reclamation in ieee80211_do_stop() to avoid warnings and potential issues caused by calling __dev_queue_xmit() with interrupts disabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47713" }, { "cve": "CVE-2024-47718", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "wifi: rtw88: vulnerability may lead to a use-after-free (UAF) error if firmware loading is not properly synchronized during USB initialization and disconnection.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47718" }, { "cve": "CVE-2024-47723", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix out-of-bounds in dbNextAG() and diAlloc()\r\n\r\nIn dbNextAG() , there is no check for the case where bmp-\u003edb_numag is greater or same than MAXAG due to a polluted image, which causes an out-of-bounds. Therefore, a bounds check should be added in dbMount().\r\n\r\nAnd in dbNextAG(), a check for the case where agpref is greater than bmp-\u003edb_numag should be added, so an out-of-bounds exception should be prevented.\r\n\r\nAdditionally, a check for the case where agno is greater or same than MAXAG should be added in diAlloc() to prevent out-of-bounds.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47723" }, { "cve": "CVE-2024-47735", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "RDMA/hns: missuse of spin_lock_irq()/spin_unlock_irq() when spin_lock_irqsave()/spin_lock_irqrestore() was hold.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47735" }, { "cve": "CVE-2024-47737", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: nfsd: call cache_put if xdr_reserve_space returns NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47737" }, { "cve": "CVE-2024-47739", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "padata: missing integer wrap around can cause deadlock on seq_nr overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47739" }, { "cve": "CVE-2024-47740", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Inf2fs: Require FMODE_WRITE for atomic write ioctls. The F2FS ioctls for starting and committing atomic writes check for inode_owner_or_capable(), but this does not give LSMs like SELinux or Landlock an opportunity to deny the write access - if the caller\u0027s FSUID matches the inode\u0027s UID, inode_owner_or_capable() immediately returns true.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47740" }, { "cve": "CVE-2024-47742", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "firmware_loader: Block path traversal Most firmware names are hardcoded strings, or are constructed from fairly constrained format strings where the dynamic parts are just some hex numbers or such. However, there are a couple codepaths in the kernel where firmware file names contain string components that are passed through from a device or semi-privileged userspace.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47742" }, { "cve": "CVE-2024-47747", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition. In the ether3_probe function, a timer is initialized with a callback function ether3_ledoff, bound to \u0026prev(dev)-\u003etimer. Once the timer is started, there is a risk of a race condition if the module or device is removed, triggering the ether3_remove function to perform cleanup.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47747" }, { "cve": "CVE-2024-47748", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "vhost_vdpa: assign irq bypass producer token correctly.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47748" }, { "cve": "CVE-2024-47749", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "RDMA/cxgb4: Added NULL check for lookup_atid. The lookup_atid() function can return NULL if the ATID is invalid or does not exist in the identifier table, which could lead to dereferencing a null pointer without a check in the `act_establish()` and `act_open_rpl()` functions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47749" }, { "cve": "CVE-2024-47756", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "PCI: keystone: Fix if-statement expression in ks_pcie_quirk(). This code accidentally uses \u0026\u0026 where || was intended. It potentially results in a NULL dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47756" }, { "cve": "CVE-2024-47757", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "nilfs2: potential oob read in nilfs_btree_check_delete(). The function nilfs_btree_check_delete(), which checks whether degeneration to direct mapping occurs before deleting a b-tree entry, causes memory access outside the block buffer when retrieving the maximum key if the root node has no entries.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-47757" }, { "cve": "CVE-2024-48881", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-48881" }, { "cve": "CVE-2024-49851", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "notes": [ { "category": "summary", "text": "tpm: Clean up TPM space after command failure tpm_dev_transmit prepares the TPM space before attempting command transmission. However if the command fails no rollback of this preparation is done. This can result in transient handles being leaked if the device is subsequently closed with no further commands performed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49851" }, { "cve": "CVE-2024-49858", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption The TPM event log table is a Linux specific construct, where the data produced by the GetEventLog() boot service is cached in memory, and passed on to the OS using an EFI configuration table. The use of EFI_LOADER_DATA here results in the region being left unreserved in the E820 memory map constructed by the EFI stub, and this is the memory description that is passed on to the incoming kernel by kexec, which is therefore unaware that the region should be reserved. Even though the utility of the TPM2 event log after a kexec is questionable, any corruption might send the parsing code off into the weeds and crash the kernel.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49858" }, { "cve": "CVE-2024-49860", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "CPI: sysfs: validate return type of _STR method Only buffer objects are valid return values of _STR. If something else is returned description_show() will access invalid memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49860" }, { "cve": "CVE-2024-49863", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "vhost/scsi: null-ptr-dereference in vhost_scsi_get_req().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49863" }, { "cve": "CVE-2024-49867", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "btrfs: wait for fixup workers before stopping cleaner kthread during umount During unmount, at close_ctree().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49867" }, { "cve": "CVE-2024-49868", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "btrfs: a NULL pointer dereference when failed to start a new trasacntion.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49868" }, { "cve": "CVE-2024-49875", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfsd: map the EBADMSG to nfserr_io to avoid warning Ext4 will throw -EBADMSG through ext4_readdir when a checksum error occurs.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49875" }, { "cve": "CVE-2024-49877", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: When doing cleanup, if flags do not have OCFS2_BH_READAHEAD set, it may trigger NULL pointer dereference in the following ocfs2_set_buffer_uptodate() if bh is NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49877" }, { "cve": "CVE-2024-49878", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "resource: Because drivers/dax/kmem.c calls add_memory_driver_managed() during onlining CXL memory, which makes \"System RAM (kmem)\" a descendant of \"CXL Window X\". This confuses region_intersects(), which expects all \"System RAM\" resources to be at the top level of iomem_resource.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49878" }, { "cve": "CVE-2024-49879", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm: omapdrm: alloc_ordered_workqueue may return NULL pointer and cause NULL pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49879" }, { "cve": "CVE-2024-49881", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: update orig_path in ext4_find_extent().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49881" }, { "cve": "CVE-2024-49882", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ext4: In ext4_ext_try_to_merge_up(), path[1].p_bh should be set to NULL after it has been released, otherwise it may be released twice.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49882" }, { "cve": "CVE-2024-49883", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ext4: In ext4_ext_insert_extent(), if the path is reallocated in ext4_ext_create_new_leaf(), the stale path will be used and cause use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49883" }, { "cve": "CVE-2024-49884", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix slab-use-after-free in ext4_split_extent_at().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49884" }, { "cve": "CVE-2024-49889", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: avoid use-after-free in ext4_ext_show_leaf()\r\n\r\nIn ext4_find_extent(), path may be freed by error or be reallocated, so\r\nusing a previously saved *ppath may have been freed and thus may trigger\r\nuse-after-free, as follows:\r\n\r\next4_split_extent\r\n path = *ppath;\r\n ext4_split_extent_at(ppath)\r\n path = ext4_find_extent(ppath)\r\n ext4_split_extent_at(ppath)\r\n // ext4_find_extent fails to free path\r\n // but zeroout succeeds\r\n ext4_ext_show_leaf(inode, path)\r\n eh = path[depth].p_hdr\r\n // path use-after-free !!!\r\n\r\nSimilar to ext4_split_extent_at(), we use *ppath directly as an input to\r\next4_ext_show_leaf(). Fix a spelling error by the way.\r\n\r\nSame problem in ext4_ext_handle_unwritten_extents(). Since \u0027path\u0027 is only\r\nused in ext4_ext_show_leaf(), remove \u0027path\u0027 and use *ppath directly.\r\n\r\nThis issue is triggered only when EXT_DEBUG is defined and therefore does\r\nnot affect functionality.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49889" }, { "cve": "CVE-2024-49890", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/pm: ensure the fw_info is not null before using it\r\n\r\nThis resolves the dereference null return value warning reported by Coverity.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49890" }, { "cve": "CVE-2024-49892", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Initialize get_bytes_per_element\u0027s default to 1\r\n\r\nVariables, used as denominators and maybe not assigned to other values, should not be 0. bytes_per_element_y \u0026 bytes_per_element_c are initialized by get_bytes_per_element() which should never return 0.\r\n\r\nThis fixes 10 DIVIDE_BY_ZERO issues reported by Coverity.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49892" }, { "cve": "CVE-2024-49894", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Fix index out of bounds in degamma hardware format translation\r\n\r\nFixes index out of bounds issue in\r\n`cm_helper_translate_curve_to_degamma_hw_format` function. The issue\r\ncould occur when the index \u0027i\u0027 exceeds the number of transfer function\r\npoints (TRANSFER_FUNC_POINTS).\r\n\r\nThe fix adds a check to ensure \u0027i\u0027 is within bounds before accessing the\r\ntransfer function points. If \u0027i\u0027 is out of bounds the function returns\r\nfalse to indicate an error.\r\n\r\nReported by smatch:\r\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:594 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.red\u0027 1025 \u003c= s32max\r\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:595 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.green\u0027 1025 \u003c= s32max\r\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:596 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.blue\u0027 1025 \u003c= s32max", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49894" }, { "cve": "CVE-2024-49895", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: vulnerability caused by adding a check to ensure the index \u0027i\u0027 is within bounds before accessing transfer function points in cm_helper_translate_curve_to_degamma_hw_format, preventing buffer overflow errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49895" }, { "cve": "CVE-2024-49896", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: vulnerability caused by adding a null check for the stream before dereferencing it in dc_is_stream_unchanged to prevent null pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49896" }, { "cve": "CVE-2024-49900", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: Fix uninit-value access of new_ea in ea_buffer\r\n\r\nsyzbot reports that lzo1x_1_do_compress is using uninit-value:\r\n\r\n=====================================================\r\nBUG: KMSAN: uninit-value in lzo1x_1_do_compress+0x19f9/0x2510 lib/lzo/lzo1x_compress.c:178\r\n\r\n...\r\n\r\nUninit was stored to memory at:\r\n ea_put fs/jfs/xattr.c:639 [inline]\r\n\r\n...\r\n\r\nLocal variable ea_buf created at:\r\n __jfs_setxattr+0x5d/0x1ae0 fs/jfs/xattr.c:662\r\n __jfs_xattr_set+0xe6/0x1f0 fs/jfs/xattr.c:934\r\n\r\n=====================================================\r\n\r\nThe reason is ea_buf-\u003enew_ea is not initialized properly.\r\n\r\nFix this by using memset to empty its content at the beginning\r\nin ea_get().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49900" }, { "cve": "CVE-2024-49901", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/msm/adreno: vulnerability caused by assigning msm_gpu-\u003epdev earlier in the initialization process to prevent null pointer dereferences in msm_gpu_cleanup.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49901" }, { "cve": "CVE-2024-49902", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "jfs: vulnerability caused by assigning msm_gpu-\u003epdev earlier in the initialization process to prevent null pointer dereferences in msm_gpu_cleanup.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49902" }, { "cve": "CVE-2024-49903", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: Fix uaf in dbFreeBits\r\n\r\n[syzbot reported]\r\n==================================================================\r\nBUG: KASAN: slab-use-after-free in __mutex_lock_common kernel/locking/mutex.c:587 [inline]\r\nBUG: KASAN: slab-use-after-free in __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752\r\nRead of size 8 at addr ffff8880229254b0 by task syz-executor357/5216\r\n\r\nCPU: 0 UID: 0 PID: 5216 Comm: syz-executor357 Not tainted 6.11.0-rc3-syzkaller-00156-gd7a5aa4b3c00 #0\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024\r\nCall Trace:\r\n \u003cTASK\u003e\r\n __dump_stack lib/dump_stack.c:93 [inline]\r\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119\r\n print_address_description mm/kasan/report.c:377 [inline]\r\n print_report+0x169/0x550 mm/kasan/report.c:488\r\n kasan_report+0x143/0x180 mm/kasan/report.c:601\r\n __mutex_lock_common kernel/locking/mutex.c:587 [inline]\r\n __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752\r\n dbFreeBits+0x7ea/0xd90 fs/jfs/jfs_dmap.c:2390\r\n dbFreeDmap fs/jfs/jfs_dmap.c:2089 [inline]\r\n dbFree+0x35b/0x680 fs/jfs/jfs_dmap.c:409\r\n dbDiscardAG+0x8a9/0xa20 fs/jfs/jfs_dmap.c:1650\r\n jfs_ioc_trim+0x433/0x670 fs/jfs/jfs_discard.c:100\r\n jfs_ioctl+0x2d0/0x3e0 fs/jfs/ioctl.c:131\r\n vfs_ioctl fs/ioctl.c:51 [inline]\r\n __do_sys_ioctl fs/ioctl.c:907 [inline]\r\n __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\r\n\r\nFreed by task 5218:\r\n kasan_save_stack mm/kasan/common.c:47 [inline]\r\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\r\n kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579\r\n poison_slab_object+0xe0/0x150 mm/kasan/common.c:240\r\n __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256\r\n kasan_slab_free include/linux/kasan.h:184 [inline]\r\n slab_free_hook mm/slub.c:2252 [inline]\r\n slab_free mm/slub.c:4473 [inline]\r\n kfree+0x149/0x360 mm/slub.c:4594\r\n dbUnmount+0x11d/0x190 fs/jfs/jfs_dmap.c:278\r\n jfs_mount_rw+0x4ac/0x6a0 fs/jfs/jfs_mount.c:247\r\n jfs_remount+0x3d1/0x6b0 fs/jfs/super.c:454\r\n reconfigure_super+0x445/0x880 fs/super.c:1083\r\n vfs_cmd_reconfigure fs/fsopen.c:263 [inline]\r\n vfs_fsconfig_locked fs/fsopen.c:292 [inline]\r\n __do_sys_fsconfig fs/fsopen.c:473 [inline]\r\n __se_sys_fsconfig+0xb6e/0xf80 fs/fsopen.c:345\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\n[Analysis]\r\nThere are two paths (dbUnmount and jfs_ioc_trim) that generate race condition when accessing bmap, which leads to the occurrence of uaf.\r\n\r\nUse the lock s_umount to synchronize them, in order to avoid uaf caused by race condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49903" }, { "cve": "CVE-2024-49907", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "drm/amd/display: missing null pointer check before using dc-\u003eclk_mgr.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49907" }, { "cve": "CVE-2024-49913", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "drm/amd/display: missing null check for top_pipe_to_program in commit_planes_for_stream.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49913" }, { "cve": "CVE-2024-49924", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "fbdev: pxafb:use after free in pxafb_task(). In the pxafb_probe function, it calls the pxafb_init_fbinfo function, after which \u0026fbi-\u003etask is associated with pxafb_task. Moreover, within this pxafb_init_fbinfo function, the pxafb_blank function within the \u0026pxafb_ops struct is capable of scheduling work. If we remove the module which will call pxafb_remove to make cleanup, it will call unregister_framebuffer function which can call do_unregister_framebuffer to free fbi-\u003efb through put_fb_info(fb_info), while the work mentioned above will be used.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49924" }, { "cve": "CVE-2024-49930", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "wifi: ath11k: fix array out-of-bound access in SoC stats. Currently, the ath11k_soc_dp_stats::hal_reo_error array is defined with a maximum size of DP_REO_DST_RING_MAX. However, the ath11k_dp_process_rx() function access ath11k_soc_dp_stats::hal_reo_error using the REO destination SRNG ring ID, which is incorrect. SRNG ring ID differ from normal ring ID, and this usage leads to out-of-bounds array access.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49930" }, { "cve": "CVE-2024-49933", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "blk_iocost: fix more out of bound shifts.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49933" }, { "cve": "CVE-2024-49936", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "net/xen-netback: prevent UAF in xenvif_flush_hash(). During the list_for_each_entry_rcu iteration call of xenvif_flush_hash, kfree_rcu does not exist inside the rcu read critical section, so if kfree_rcu is called when the rcu grace period ends during the iteration, UAF occurs when accessing head-\u003enext after the entry becomes free.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49936" }, { "cve": "CVE-2024-49938", "cwe": { "id": "CWE-824", "name": "Access of Uninitialized Pointer" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit\r\n\r\nSyzbot points out that skb_trim() has a sanity check on the existing length of the skb, which can be uninitialised in some error paths. The intent here is clearly just to reset the length to zero before resubmitting, so switch to calling __skb_set_length(skb, 0) directly. In addition, __skb_set_length() already contains a call to skb_reset_tail_pointer(), so remove the redundant call.\r\n\r\nThe syzbot report came from ath9k_hif_usb_reg_in_cb(), but there\u0027s a similar usage of skb_trim() in ath9k_hif_usb_rx_cb(), change both while we\u0027re at it.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49938" }, { "cve": "CVE-2024-49944", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start. In sctp_listen_start() invoked by sctp_inet_listen(), it should set the sk_state back to CLOSED if sctp_autobind() fails due to whatever reason. Otherwise, next time when calling sctp_inet_listen(), if sctp_sk(sk)-\u003ereuse is already set via setsockopt(SCTP_REUSE_PORT), sctp_sk(sk)-\u003ebind_hash will be dereferenced as sk_state is LISTENING, which causes a crash as bind_hash is NULL", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49944" }, { "cve": "CVE-2024-49948", "cwe": { "id": "CWE-124", "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: add more sanity checks to qdisc_pkt_len_init().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49948" }, { "cve": "CVE-2024-49949", "cwe": { "id": "CWE-124", "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: avoid potential underflow in qdisc_pkt_len_init() with UFO.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49949" }, { "cve": "CVE-2024-49952", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: prevent nf_skb_duplicated corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49952" }, { "cve": "CVE-2024-49955", "cwe": { "id": "CWE-672", "name": "Operation on a Resource after Expiration or Release" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nACPI: battery: Fix possible crash when unregistering a battery hook\r\n\r\nWhen a battery hook returns an error when adding a new battery, then the battery hook is automatically unregistered.\r\nHowever the battery hook provider cannot know that, so it will later call battery_hook_unregister() on the already unregistered battery hook, resulting in a crash.\r\n\r\nFix this by using the list head to mark already unregistered battery hooks as already being unregistered so that they can be ignored by battery_hook_unregister().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49955" }, { "cve": "CVE-2024-49957", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: null-ptr-deref when journal load failed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49957" }, { "cve": "CVE-2024-49958", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: reserve space for inline xattr before attaching reflink tree.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49958" }, { "cve": "CVE-2024-49959", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error In __jbd2_log_wait_for_space(), we might call jbd2_cleanup_journal_tail() to recover some journal space.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49959" }, { "cve": "CVE-2024-49962", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49962" }, { "cve": "CVE-2024-49963", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mailbox: bcm2835: timeout during suspend mode.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49963" }, { "cve": "CVE-2024-49965", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: remove unreasonable unlock in ocfs2_read_blocks Patch series \"Misc fixes for ocfs2_read_blocks\", v5.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49965" }, { "cve": "CVE-2024-49966", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: cancel dqi_sync_work before freeing oinfo ocfs2_global_read_info() will initialize and schedule dqi_sync_work at the end.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49966" }, { "cve": "CVE-2024-49967", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ext4: no need to continue when the number of entries is 1.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49967" }, { "cve": "CVE-2024-49969", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: index out of bounds in DCN30 color transformation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49969" }, { "cve": "CVE-2024-49971", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: dml2_core_shared_mode_support and dml_core_mode_support access the third element of dummy_boolean, for example: hw_debug5 = \u0026s-\u003edummy_boolean. Any assignment to hw_debug5 would cause an OVERRUN.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49971" }, { "cve": "CVE-2024-49973", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "r8169: RTL8125 added fields to the tally counter, this change could cause the chip to perform Direct Memory Access on these new fields, potentially writing to unallocated memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49973" }, { "cve": "CVE-2024-49975", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "uprobes: vma xol_add_vma() maps the uninitialized page allocated by __create_xol_area() into userspace. On some architectures (x86) this memory is readable even without VM_READ permission. Additionally setting VM_EXEC produces the same page protection attributes (pgprot_t) as setting both VM_EXEC and VM_READ. Nevertheless, the debugger can read this memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49975" }, { "cve": "CVE-2024-49977", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: stmmac: port_transmit_rate_kbps could be set to a value of 0, which is then passed to the \"div_s64\" function when tc-cbs is disabled. This leads to a zero-division error.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49977" }, { "cve": "CVE-2024-49981", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: venus: A race condition may trigger a use after free vulnerability in venus_remove.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49981" }, { "cve": "CVE-2024-49982", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in more places For fixing CVE-2023-6270, f98364e92662 (\"aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts\") makes tx() calling dev_put() instead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs into use-after-free. Then Nicolai Stange found more places in aoe have potential use-after-free problem with tx(). e.g. revalidate(), aoecmd_ata_rw(), resend(), probe() and aoecmd_cfg_rsp(). Those functions also use aoenet_xmit() to push packet to tx queue. So they should also use dev_hold() to increase the refcnt of skb-\u003edev. On the other hand, moving dev_put() to tx() causes that the refcnt of skb-\u003edev be reduced to a negative value, because corresponding dev_hold() are not called in revalidate(), aoecmd_ata_rw(), resend(), probe(), and aoecmd_cfg_rsp(). This patch fixed this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49982" }, { "cve": "CVE-2024-49983", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ext4: When calling ext4_force_split_extent_at() in ext4_ext_replay_update_ex(), the \u0027ppath\u0027 is updated but it is the \u0027path\u0027 that is freed, thus potentially triggering a double-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49983" }, { "cve": "CVE-2024-49985", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "i2c: stm32f7: In case there is any sort of clock controller attached to the I2C bus controller, for example Versaclock or even an AIC32x4 I2C codec, then an I2C transfer triggered from the clock controller clk_ops .prepare callback may trigger a deadlock on drivers/clk/clk.c prepare_lock mutex.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49985" }, { "cve": "CVE-2024-49993", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "iommu/vt-d: vulnerability may cause a soft lockup if qi_submit_sync() is called with zero invalidation descriptors, as the completion of invalidation_wait may not be detected, leading to an indefinite wait.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49993" }, { "cve": "CVE-2024-49995", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tipc: vulnerability due to a potential buffer overrun when copying media_name and if_name to name_parts, which may be prevented by using strscpy() to avoid overwriting the destination buffer.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49995" }, { "cve": "CVE-2024-49997", "cwe": { "id": "CWE-226", "name": "Sensitive Information in Resource Not Removed Before Reuse" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix memory disclosure When applying padding, the buffer is not zeroed, which results in memory disclosure. The mentioned data is observed on the wire. This patch uses skb_put_padto() to pad Ethernet frames properly. The mentioned function zeroes the expanded buffer. In case the packet cannot be padded it is silently dropped. Statistics are also not incremented. This driver does not support statistics in the old 32-bit format or the new 64-bit format. These will be added in the future. In its current form, the patch should be easily backported to stable versions. Ethernet MACs on Amazon-SE and Danube cannot do padding of the packets in hardware, so software padding must be applied.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-49997" }, { "cve": "CVE-2024-50001", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/mlx5: Fix error path in multi-packet WQE transmit\r\n\r\nRemove the erroneous unmap in case no DMA mapping was established\r\n\r\nThe multi-packet WQE transmit code attempts to obtain a DMA mapping for the skb. This could fail, e.g. under memory pressure, when the IOMMU driver just can\u0027t allocate more memory for page tables. While the code tries to handle this in the path below the err_unmap label it erroneously unmaps one entry from the sq\u0027s FIFO list of active mappings. Since the current map attempt failed this unmap is removing some random DMA mapping that might still be required. If the PCI function now presents that IOVA, the IOMMU may assumes a rogue DMA access and e.g. on s390 puts the PCI function in error state.\r\n\r\nThe erroneous behavior was seen in a stress-test environment that created memory pressure.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50001" }, { "cve": "CVE-2024-50006", "cwe": { "id": "CWE-833", "name": "Deadlock" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix i_data_sem unlock order in ext4_ind_migrate().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50006" }, { "cve": "CVE-2024-50007", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: asihpi: potential OOB array access ASIHPI driver stores some values in the static array upon a response from the driver, and its index depends on the firmware.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50007" }, { "cve": "CVE-2024-50008", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "wifi: mwifiex: memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() Replace one-element array with a flexible-array member in `struct host_cmd_ds_802_11_scan_ext`.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50008" }, { "cve": "CVE-2024-50013", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "exfat: memory leak in exfat_load_bitmap() If the first directory entry in the root directory is not a bitmap directory entry, \u0027bh\u0027 will not be released and reassigned, which will cause a memory leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50013" }, { "cve": "CVE-2024-50015", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "ext4: dax: Overflowing extents beyond inode size when partially writing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50015" }, { "cve": "CVE-2024-50024", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: unsafe loop on the list.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50024" }, { "cve": "CVE-2024-50033", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nslip: make slhc_remember() more robust against malicious packets\r\n\r\nsyzbot found that slhc_remember() was missing checks against\r\nmalicious packets [1].\r\n\r\nslhc_remember() only checked the size of the packet was at least 20,\r\nwhich is not good enough.\r\n\r\nWe need to make sure the packet includes the IPv4 and TCP header\r\nthat are supposed to be carried.\r\n\r\nAdd iph and th pointers to make the code more readable.\r\n\r\n[1]\r\n\r\nBUG: KMSAN: uninit-value in slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666\r\n slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666\r\n ppp_receive_nonmp_frame+0xe45/0x35e0 drivers/net/ppp/ppp_generic.c:2455\r\n ppp_receive_frame drivers/net/ppp/ppp_generic.c:2372 [inline]\r\n ppp_do_recv+0x65f/0x40d0 drivers/net/ppp/ppp_generic.c:2212\r\n ppp_input+0x7dc/0xe60 drivers/net/ppp/ppp_generic.c:2327\r\n pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379\r\n sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113\r\n __release_sock+0x1da/0x330 net/core/sock.c:3072\r\n release_sock+0x6b/0x250 net/core/sock.c:3626\r\n pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nUninit was created at:\r\n slab_post_alloc_hook mm/slub.c:4091 [inline]\r\n slab_alloc_node mm/slub.c:4134 [inline]\r\n kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4186\r\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587\r\n __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678\r\n alloc_skb include/linux/skbuff.h:1322 [inline]\r\n sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732\r\n pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nCPU: 0 UID: 0 PID: 5460 Comm: syz.2.33 Not tainted 6.12.0-rc2-syzkaller-00006-g87d6aab2389e #0\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50033" }, { "cve": "CVE-2024-50035", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nppp: fix ppp_async_encode() illegal access\r\n\r\nsyzbot reported an issue in ppp_async_encode() [1]\r\n\r\nIn this case, pppoe_sendmsg() is called with a zero size.\r\nThen ppp_async_encode() is called with an empty skb.\r\n\r\nBUG: KMSAN: uninit-value in ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]\r\n BUG: KMSAN: uninit-value in ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675\r\n ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]\r\n ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675\r\n ppp_async_send+0x130/0x1b0 drivers/net/ppp/ppp_async.c:634\r\n ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2280 [inline]\r\n ppp_input+0x1f1/0xe60 drivers/net/ppp/ppp_generic.c:2304\r\n pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379\r\n sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113\r\n __release_sock+0x1da/0x330 net/core/sock.c:3072\r\n release_sock+0x6b/0x250 net/core/sock.c:3626\r\n pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nUninit was created at:\r\n slab_post_alloc_hook mm/slub.c:4092 [inline]\r\n slab_alloc_node mm/slub.c:4135 [inline]\r\n kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4187\r\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587\r\n __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678\r\n alloc_skb include/linux/skbuff.h:1322 [inline]\r\n sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732\r\n pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nCPU: 1 UID: 0 PID: 5411 Comm: syz.1.14 Not tainted 6.12.0-rc1-syzkaller-00165-g360c1f1f24c6 #0\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50035" }, { "cve": "CVE-2024-50039", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/sched: accept TCA_STAB only for root qdisc\r\n\r\nMost qdiscs maintain their backlog using qdisc_pkt_len(skb) on the assumption it is invariant between the enqueue() and dequeue() handlers.\r\n\r\nUnfortunately syzbot can crash a host rather easily using a TBF + SFQ combination, with an STAB on SFQ [1]\r\n\r\nWe can\u0027t support TCA_STAB on arbitrary level, this would require to maintain per-qdisc storage.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50039" }, { "cve": "CVE-2024-50040", "cwe": { "id": "CWE-390", "name": "Detection of Error Condition Without Action" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: igb: Do not bring the device up after non-fatal error.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50040" }, { "cve": "CVE-2024-50044", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nBluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change\r\n\r\nrfcomm_sk_state_change attempts to use sock_lock so it must never be called with it locked but rfcomm_sock_ioctl always attempt to lock it.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50044" }, { "cve": "CVE-2024-50045", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: br_netfilter: fix panic with metadata_dst skb.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50045" }, { "cve": "CVE-2024-50046", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nNFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies()\r\n\r\nOn the node of an NFS client, some files saved in the mountpoint of the NFS server were copied to another location of the same NFS server.\r\nAccidentally, the nfs42_complete_copies() got a NULL-pointer dereference crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50046" }, { "cve": "CVE-2024-50049", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: null pointer before dereferencing se.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50049" }, { "cve": "CVE-2024-50051", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "spi: mpc52xx: Add cancel_work_sync before module remove. If the module which will call mpc52xx_spi_remove is removed, it will free \u0027ms\u0027 through spi_unregister_controller. while the work ms-\u003ework will be used. The sequence of operations that may lead to a UAF bug.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50051" }, { "cve": "CVE-2024-50059", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ntb: ntb_hw_switchtec: use after free vulnerability in switchtec_ntb_remove due to race condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50059" }, { "cve": "CVE-2024-50074", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "parport: The recent fix for array out-of-bounds accesses replaced sprintf() calls blindly with snprintf(). However, since snprintf() returns the would-be-printed size, not the actually output size, the length calculation can still go over the given limit.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50074" }, { "cve": "CVE-2024-50082", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "blk-rq-qos: vulnerability in blk-rq-qos can cause a crash due to a race condition between rq_qos_wait and rq_qos_wake_function, which is fixed by ensuring the waitqueue entry is accessed in the correct order.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50082" }, { "cve": "CVE-2024-50083", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tcp: vulnerability in may cause DSS corruption due to large PMTU transmissions, which is fixed by addressing the issue in the __mptcp_move_skbs_from_subflow function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50083" }, { "cve": "CVE-2024-50089", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "unicode: problematic ignorable code points.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50089" }, { "cve": "CVE-2024-50095", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nRDMA/mad: Improve handling of timed out WRs of mad agent\r\n\r\nCurrent timeout handler of mad agent acquires/releases mad_agent_priv lock for every timed out WRs. This causes heavy locking contention when higher no. of WRs are to be handled inside timeout handler.\r\n\r\nThis leads to softlockup with below trace in some use cases where rdma-cm path is used to establish connection between peer nodes\r\n\r\n\r\nSimplified timeout handler by creating local list of timed out WRs and invoke send handler post creating the list. The new method acquires/releases lock once to fetch the list and hence helps to reduce locking contetiong when processing higher no. of WRs", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50095" }, { "cve": "CVE-2024-50096", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nouveau/dmem: vulnerability in migrate_to_ram upon copy error.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50096" }, { "cve": "CVE-2024-50099", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "arm64: probes: Broken LDR (literal) uprobe support.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50099" }, { "cve": "CVE-2024-50179", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ceph: incorrect Fw reference check when dirtying pages.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50179" }, { "cve": "CVE-2024-50180", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "fbdev: sisfb: Fix strbuf array overflow. The values of the variables xres and yres are placed in strbuf. These variables are obtained from strbuf1. The strbuf1 array contains digit characters and a space if the array contains non-digit characters. Then, when executing sprintf(strbuf, \"%ux%ux8\", xres, yres); more than 16 bytes will be written to strbuf.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50180" }, { "cve": "CVE-2024-50181", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D. For i.MX7D DRAM related mux clock, the clock source change should ONLY be done done in low level asm code without accessing DRAM, and then calling clk API to sync the HW clock status with clk tree, it should never touch real clock source switch via clk API, so CLK_SET_PARENT_GATE flag should NOT be added, otherwise, DRAM\u0027s clock parent will be disabled when DRAM is active, and system will hang.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50181" }, { "cve": "CVE-2024-50184", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "virtio_pmem: Check device status before requesting flush. If a pmem device is in a bad status, the driver side could wait for host ack forever in virtio_pmem_flush(), causing the system to hang.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50184" }, { "cve": "CVE-2024-50185", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "linux: mptcp: handle consistently DSS corruption. Bugged peer implementation can send corrupted DSS options, consistently hitting a few warning in the data path.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50185" }, { "cve": "CVE-2024-50188", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "net: phy: dp83869: fix memory corruption when enabling fiber. When configuring the fiber port, the DP83869 PHY driver incorrectly calls linkmode_set_bit() with a bit mask (1 \u0026lt;\u0026lt; 10) rather than a bit number (10). This corrupts some other memory location -- in case of arm64 the priv pointer in the same structure.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50188" }, { "cve": "CVE-2024-50193", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "x86/entry_32: Clear CPU buffers after register restore in NMI return CPU buffers are currently cleared after call to exc_nmi, but before register state is restored. This may be okay for MDS mitigation but not for RDFS. Because RDFS mitigation requires CPU buffers to be cleared when registers don\u0027t have any sensitive data. Move CLEAR_CPU_BUFFERS after RESTORE_ALL_NMI.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50193" }, { "cve": "CVE-2024-50194", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "arm64: probes: Fix uprobes for big-endian kernels The arm64 uprobes code is broken for big-endian kernels as it doesn\u0027t convert the in-memory instruction encoding (which is always little-endian) into the kernel\u0027s native endianness before analyzing and simulating instructions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50194" }, { "cve": "CVE-2024-50195", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "posix-clock: Fix missing timespec64 check in pc_clock_settime().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50195" }, { "cve": "CVE-2024-50198", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "iio: light: veml6030: fix IIO device retrieval from embedded device. The dev pointer that is received as an argument in the in_illuminance_period_available_show function references the device embedded in the IIO device, not in the i2c client. dev_to_iio_dev() must be used to accessthe right data. The current implementation leads to a segmentation fault on every attempt to read the attribute because indio_dev gets a NULL assignment.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50198" }, { "cve": "CVE-2024-50199", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mm/swapfile: skip HugeTLB pages for unuse_vma I got a bad pud error and lost a 1GB HugeTLB when calling swapoff.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50199" }, { "cve": "CVE-2024-50201", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "linux: drm/radeon: encoder-\u003epossible_clones. In the past nothing validated that drivers were populating possible_clones correctly, which resulted in some warnings during driver initialization.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50201" }, { "cve": "CVE-2024-50202", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: propagate directory read errors from nilfs_find_entry(). A task hang occurs in vcs_open() during a fuzzing test for nilfs2. The root cause of this problem is that in nilfs_find_entry(), which searches for directory entries, ignores errors when loading a directory page/folio via nilfs_get_folio() fails. If the filesystem images is corrupted, and the i_size of the directory inode is large, and the directory page/folio is successfully read but fails the sanity check.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50202" }, { "cve": "CVE-2024-50218", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50218" }, { "cve": "CVE-2024-50234", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "summary", "text": "wifi: iwlegacy: vulnerability due to stale interrupts not being cleared before resuming the iwl4965 device from hibernation, causing a race condition between the resume process and restart work.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50234" }, { "cve": "CVE-2024-50236", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: ath10k: Fix memory leak in management tx In the current logic, memory is allocated for storing the MSDU context during management packet TX but this memory is not being freed during management TX completion. Similar leaks are seen in the management TX cleanup logic.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50236" }, { "cve": "CVE-2024-50237", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower Avoid potentially crashing in the driver because of uninitialized private data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50237" }, { "cve": "CVE-2024-50251", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() If access to offset + length is larger than the skbuff length, then skb_checksum() triggers BUG_ON(). skb_checksum() internally subtracts the length parameter while iterating over skbuff, BUG_ON(len) at the end of it checks that the expected length to be included in the checksum calculation is fully consumed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50251" }, { "cve": "CVE-2024-50262", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds write in trie_get_next_key().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50262" }, { "cve": "CVE-2024-50264", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "vsock/virtio: Initialization of the dangling pointer occurring in vsk-\u003etrans. During loopback communication, a dangling pointer can be created in vsk-\u003etrans, potentially leading to a Use-After-Free condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50264" }, { "cve": "CVE-2024-50265", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() Syzkaller is able to provoke null-ptr-dereference in ocfs2_xa_remove().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50265" }, { "cve": "CVE-2024-50267", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "USB: serial: io_edgeport: fix use after free in debug printk The \"dev_dbg(\u0026urb-\u003edev-\u003edev, ...\" which happens after usb_free_urb(urb) is a use after free of the \"urb\" pointer.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50267" }, { "cve": "CVE-2024-50268", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd(). The \"*cmd\" variable can be controlled by the user via debugfs. That means \"new_cam\" can be as high as 255 while the size of the uc-\u003eupdated[] array is UCSI_MAX_ALTMODES (30). The call tree is: ucsi_cmd() // val comes from simple_attr_write_xsigned() -\u003e ucsi_send_command() -\u003e ucsi_send_command_common() -\u003e ucsi_run_command() // calls ucsi-\u003eops-\u003esync_control() -\u003e ucsi_ccg_sync_control().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50268" }, { "cve": "CVE-2024-50269", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "usb: musb: sunxi: accessing an released usb phy will cause that usb phy @glue-\u003exceiv is accessed after released.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50269" }, { "cve": "CVE-2024-50273", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "btrfs: reinitialize delayed ref list after deleting it from the list. At insert_delayed_ref() if there is a need to update the action of an existing ref to BTRFS_DROP_DELAYED_REF, the ref from its ref head\u0027s ref_add_list is deleted using list_del(), which leaves the ref\u0027s add_list member not reinitialized, as list_del() sets the next and prev members of the list to LIST_POISON1 and LIST_POISON2, respectively.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50273" }, { "cve": "CVE-2024-50278", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "dm cache: potential out-of-bounds access on the first resume Out-of-bounds access occurs if the fast device is expanded unexpectedly before the first-time resume of the cache table.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50278" }, { "cve": "CVE-2024-50279", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "dm cache: out-of-bounds access to the dirty bitset when resizing dm-cache checks the dirty bits of the cache blocks to be dropped when shrinking the fast device, but an index bug in bitset iteration causes out-of-bounds access.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50279" }, { "cve": "CVE-2024-50282", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() Avoid a possible buffer overflow if size is larger than 4K.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50282" }, { "cve": "CVE-2024-50287", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: v4l2-tpg: prevent the risk of a division by zero As reported by Coverity, the logic at tpg_precalculate_line() blindly rescales the buffer even when scaled_witdh is equal to zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50287" }, { "cve": "CVE-2024-50290", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: cx24116: prevent overflows on SNR calculus as reported by Coverity, if reading SNR registers fail, a negative number will be returned, causing an underflow when reading SNR registers. Prevent that.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50290" }, { "cve": "CVE-2024-50292", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ASoC: stm32: spdifrx: dma channel release in stm32_spdifrx_remove In case of error when requesting ctrl_chan DMA channel, ctrl_chan is not null.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50292" }, { "cve": "CVE-2024-50295", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: arc: A warning is shown because ndev-\u003edev and pdev-\u003edev are not the same device.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50295" }, { "cve": "CVE-2024-50296", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hns3: A kernel crash may occur when the driver is uninstalled and the VF is disabled concurrently.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50296" }, { "cve": "CVE-2024-50299", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb()", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50299" }, { "cve": "CVE-2024-50301", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: security/keys: fix slab-out-of-bounds in key_task_permission.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50301" }, { "cve": "CVE-2024-50302", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let\u0027s zero-initialize it during allocation to make sure that it can\u0027t be ever used to leak kernel memory via specially-crafted report.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50302" }, { "cve": "CVE-2024-50304", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ipv4: ip_tunnel: Suspicious RCU usage warning in ip_tunnel_find().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50304" }, { "cve": "CVE-2024-50602", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-50602" }, { "cve": "CVE-2024-52332", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "igb: Fix potential invalid memory access in igb_init_module() The pci_register_driver() can fail and when this happened, the dca_notifier needs to be unregistered, otherwise the dca_notifier can be called when igb fails to install, resulting to invalid memory access.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-52332" }, { "cve": "CVE-2024-53052", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "io_uring/rw: vulnerability due to io_uring not checking for IOCB_NOWAIT when starting an O_DIRECT write, leading to potential deadlocks if the mount point is being frozen.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53052" }, { "cve": "CVE-2024-53057", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53057" }, { "cve": "CVE-2024-53059", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()\r\n\r\n1. The size of the response packet is not validated.\r\n2. The response buffer is not freed.\r\n\r\nResolve these issues by switching to iwl_mvm_send_cmd_status(), which handles both size validation and frees the buffer.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53059" }, { "cve": "CVE-2024-53060", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability due to a potential NULL pointer dereference in drm/amdgpu if acpi_evaluate_object() returns AE_NOT_FOUND, which is mitigated by bailing out when this status is encountered.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53060" }, { "cve": "CVE-2024-53061", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "media: s5p-jpeg: vulnerability due to the possibility of buffer overflows when the variable word is less than 2, which is prevented by adding extra checks.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53061" }, { "cve": "CVE-2024-53063", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: dvbdev: risk of out of memory access.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53063" }, { "cve": "CVE-2024-53066", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfs: KMSAN warning in decode_getfattr_attrs().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53066" }, { "cve": "CVE-2024-53097", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mm: krealloc: MTE false alarm in __do_krealloc.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53097" }, { "cve": "CVE-2024-53101", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: fs: Fix uninitialized value issue in from_kuid and from_kgid ocfs2_setattr() uses attr-\u003eia_mode, attr-\u003eia_uid and attr-\u003eia_gid in a trace point even though ATTR_MODE, ATTR_UID and ATTR_GID aren\u0027t set. Initialize all fields of newattrs to avoid uninitialized variables, by checking if ATTR_MODE, ATTR_UID, ATTR_GID are initialized, otherwise 0.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53101" }, { "cve": "CVE-2024-53103", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hv_sock: Initializing vsk-\u003etrans to NULL to prevent a dangling pointer When hvs is released, there is a possibility that vsk-\u003etrans may not be initialized to NULL, which could lead to a dangling pointer.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53103" }, { "cve": "CVE-2024-53104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53104" }, { "cve": "CVE-2024-53145", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "um: potential integer overflow during physmem setup. This vulnerability happens when the real map size is greater than LONG_MAX, which can be easily triggered on UML/i386.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53145" }, { "cve": "CVE-2024-53146", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NFSD: Prevent a potential integer overflow If the tag length is \u003e= U32_MAX - 3 then the \"length + 4\" addition can result in an integer overflow. Address this by splitting the decoding into several steps so that decode_cb_compound4res() does not have to perform arithmetic on the unsafe length value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53146" }, { "cve": "CVE-2024-53148", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "comedi: Flush partial mappings in error case If some remap_pfn_range() calls succeeded before one failed, we still have buffer pages mapped into the userspace page tables when we drop the buffer reference with comedi_buf_map_put(bm). The userspace mappings are only cleaned up later in the mmap error path.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53148" }, { "cve": "CVE-2024-53150", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "ALSA: usb-audio: out of bounds reads when finding clock sources The current USB-audio driver code doesn\u0027t check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal. When the descriptor length is shorter than expected, it\u0027s skipped in the loop. For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:H/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53150" }, { "cve": "CVE-2024-53155", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: uninitialized value in ocfs2_file_read_iter().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53155" }, { "cve": "CVE-2024-53156", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53156" }, { "cve": "CVE-2024-53157", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "firmware: arm_scpi: Check the DVFS OPP count returned by the firmware Fix a kernel crash with the below call trace when the SCPI firmware returns OPP count of zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53157" }, { "cve": "CVE-2024-53158", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "soc: qcom: geni-se: array underflow in geni_se_clk_tbl_get() This loop is supposed to break if the frequency returned from clk_round_rate() is the same as on the previous iteration. However, that check doesn\u0027t make sense on the first iteration through the loop. It leads to reading before the start of these-\u003eclk_perf_tbl[] array.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53158" }, { "cve": "CVE-2024-53161", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "EDAC/bluefield: potential integer overflow The 64-bit argument for the \"get DIMM info\" SMC call consists of mem_ctrl_idx left-shifted 16 bits and OR-ed with DIMM index. With mem_ctrl_idx defined as 32-bits wide the left-shift operation truncates the upper 16 bits of information during the calculation of the SMC argument. The mem_ctrl_idx stack variable must be defined as 64-bits wide to prevent any potential integer overflow, i.e. loss of data from upper 16 bits.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53161" }, { "cve": "CVE-2024-53165", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let\u0027s only add it to the list after everything has succeeded.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53165" }, { "cve": "CVE-2024-53171", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ubifs: authentication: After an insertion in TNC, the tree might split and cause a node to change its `znode-\u003eparent`. A further deletion of other nodes in the tree (which also could free the nodes), the aforementioned node\u0027s `znode-\u003ecparent` could still point to a freed node. This `znode-\u003ecparent` may not be updated when getting nodes to commit in `ubifs_tnc_start_commit()`. This could then trigger a use-after-free when accessing the `znode-\u003ecparent` in `write_index()` in `ubifs_tnc_end_commit()`.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53171" }, { "cve": "CVE-2024-53172", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ubi: fastmap: The duplicate slab cache names can be detected and a kernel WARNING is thrown out.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53172" }, { "cve": "CVE-2024-53173", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NFSv4.0: When two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53173" }, { "cve": "CVE-2024-53174", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SUNRPC: The function `c_show` was called with protection from RCU. This only ensures that `cp` will not be freed. Therefore, the reference count for `cp` can drop to zero, which will trigger a refcount use-after-free warning when `cache_get` is called.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53174" }, { "cve": "CVE-2024-53181", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "um: vector: The drvdata is not available in release", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53181" }, { "cve": "CVE-2024-53183", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "um: net: The drvdata is not available in release.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53183" }, { "cve": "CVE-2024-53184", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "um: ubd: The drvdata is not available in release.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53184" }, { "cve": "CVE-2024-53194", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "PCI: vulnerability causes a use-after-free error during hot removal of a USB4 dock due to improper handling of pci_slot and pci_bus references, which is fixed by ensuring pci_slot acquires a reference to pci_bus.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53194" }, { "cve": "CVE-2024-53197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: usb-audio: vulnerability leading to out-of-bound accesses due to a bogus device providing an excessive bNumConfigurations value, which is fixed by ensuring proper allocation in usb_get_configuration.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53197" }, { "cve": "CVE-2024-53198", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "xen: issue of resource not being properly released in xenbus_dev_probe().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53198" }, { "cve": "CVE-2024-53214", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "vfio/pci: out-of-bounds access to ecap_perms array.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53214" }, { "cve": "CVE-2024-53217", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: NFSD: Prevent NULL dereference in nfsd4_process_cb_update().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53217" }, { "cve": "CVE-2024-53226", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "RDMA/hns: vulnerability due to a potential NULL pointer dereference in hns_roce_map_mr_sg() because ib_map_mr_sg() allows upper layer protocols (ULPs) to specify NULL as the sg_offset argument, requiring the driver to check for NULL before dereferencing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53226" }, { "cve": "CVE-2024-53227", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: bfa: use-after-free in bfad_im_module_exit().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53227" }, { "cve": "CVE-2024-53237", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Bluetooth: vulnerability due to an use-after-free error in the device_for_each_child function, where a device may be accessed after it has been freed, potentially leading to a dangling pointer and system instability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53237" }, { "cve": "CVE-2024-53239", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: 6fire: The current 6fire code tries to release the resources right after the call of usb6fire_chip_abort(). But at this moment, the card object might be still in use (as we\u0027re calling snd_card_free_when_closed()) and cause potential UAFs.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53239" }, { "cve": "CVE-2024-53240", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "xen/netfront: vulnerability causes a crash when removing a device after a suspend/resume cycle due to uninitialized queues, which is fixed by checking for the existence of queues before attempting to stop them.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53240" }, { "cve": "CVE-2024-53241", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "x86/xen: vulnerability due to issues with the PV iret hypercall through the hypercall page, which is fixed by directly coding the sequence in xen-asm.S to avoid problems with speculation mitigations.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53241" }, { "cve": "CVE-2024-53680", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ipvs: vulnerability causes undefined behavior due to uninitialized stack access in ip_vs_protocol_init(), which is fixed by zeroing the on-stack buffer to prevent out-of-bound accesses.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-53680" }, { "cve": "CVE-2024-56531", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: caiaq: OTOH, the current code uses snd_card_free() at disconnection, but this waits for the close of all used fds, hence it can take long. It eventually blocks the upper layer USB ioctls, which may trigger a soft lockup.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56531" }, { "cve": "CVE-2024-56532", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: us122l: OTOH, the current code uses snd_card_free() at disconnection, but this waits for the close of all used fds, hence it can take long. It eventually blocks the upper layer USB ioctls, which may trigger a soft lockup.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56532" }, { "cve": "CVE-2024-56533", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: usx2y: The USB disconnect callback takes longer than it should. The current code uses snd_card_free() at disconnection, but this waits for the close of all used fds, hence it can take long. It eventually blocks the upper layer USB ioctls, which may trigger a soft lockup.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56533" }, { "cve": "CVE-2024-56539", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56539" }, { "cve": "CVE-2024-56548", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hfsplus: Devices block sizes may change. One of these cases is a loop device by using ioctl LOOP_SET_BLOCK_SIZE. While this may cause other issues like IO being rejected, in the case of hfsplus, it will allocate a block by using that size and potentially write out-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the latter function reads a different io_size.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56548" }, { "cve": "CVE-2024-56558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfsd: make sure exp active before svc_export_show The function `e_show` was called with protection from RCU. This only ensures that `exp` will not be freed. Therefore, the reference count for `exp` can drop to zero, which will trigger a refcount use-after-free warning when `exp_get` is called.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56558" }, { "cve": "CVE-2024-56562", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "i3c: master: miss free init_dyn_addr at i3c_master_put_i3c_addrs().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56562" }, { "cve": "CVE-2024-56567", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "ad7780: division by zero in ad7780_write_raw() In the ad7780_write_raw() , val2 can be zero, which might lead to a division by zero error in DIV_ROUND_CLOSEST(). The ad7780_write_raw() is based on iio_info\u0027s write_raw. While val is explicitly declared that can be zero (in read mode), val2 is not specified to be non-zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56567" }, { "cve": "CVE-2024-56568", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "iommu/arm-smmu: Defer probe of clients after smmu device bound Null pointer dereference occurs due to a race between smmu driver probe and client driver probe, when of_dma_configure() for client is called after the iommu_device_register() for smmu driver probe has executed but before the driver_bound() for smmu driver has been called.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56568" }, { "cve": "CVE-2024-56569", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ftrace: Fix regression with module command in stack_trace_filter When executing the following command: # echo \"write*:mod:ext3\" \u003e /sys/kernel/tracing/stack_trace_filter The current mod command causes a null pointer dereference. While commit 0f17976568b3f (\"ftrace: Fix regression with module command in stack_trace_filter\") has addressed part of the issue, it left a corner case unhandled, which still results in a kernel crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56569" }, { "cve": "CVE-2024-56570", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ovl: Filter invalid inodes with missing lookup function Add a check to the ovl_dentry_weird() function to prevent the processing of directory inodes that lack the lookup function.This is important because such inodes can cause errors in overlayfs when passed to the lowerstack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56570" }, { "cve": "CVE-2024-56571", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: uvcvideo: Require entities to have a non-zero unique ID.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56571" }, { "cve": "CVE-2024-56572", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "media: platform: allegro-dvt: possible memory leak in allocate_buffers_internal(). If The buffer in the loop is not released under the exception path, it may lead to a memory leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56572" }, { "cve": "CVE-2024-56574", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: ts2020: null-ptr-deref in ts2020_probe().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56574" }, { "cve": "CVE-2024-56576", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: i2c: tc358743: crash in the probe error path when using polling. If an error occurs in the probe() function, the polling timer that was alarmed earlier should be removed, otherwise the timer is called with arguments that are already freed, which results in a crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56576" }, { "cve": "CVE-2024-56581", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "btrfs: ref-verify: use-after-free after invalid ref action.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56581" }, { "cve": "CVE-2024-56586", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "f2fs: fix f2fs_bug_on when uninstalling filesystem call f2fs_evict_inode. creating a large files during checkpoint disable until it runs out of space and then delete it, then remount to enable checkpoint again, and then unmount the filesystem triggers the f2fs_bug_on.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56586" }, { "cve": "CVE-2024-56587", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "leds: class: Protect brightness_show() with led_cdev-\u003eled_access mutex. There is NULL pointer vulnerability observed if from Process A where hid device being added which results in adding a led_cdev addition and later a another call to access of led_cdev attribute from Process B can result in NULL pointer vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56587" }, { "cve": "CVE-2024-56589", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: hisi_sas: Add cond_resched() for no forced preemption model. For no forced preemption model kernel, in the scenario where the expander is connected to 12 high performance SAS SSDs, a call trace may occur.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56589" }, { "cve": "CVE-2024-56593", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw(). This patch fixes a NULL pointer dereference bug in brcmfmac that occurs when a high \u0027sd_sgentry_align\u0027 value applies (e.g. 512) and a lot of queued SKBs are sent from the pkt queue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56593" }, { "cve": "CVE-2024-56594", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: set the right AMDGPU sg segment limitation. The driver needs to set the correct max_segment_size; otherwise debug_dma_map_sg() will complain about the over-mapping of the AMDGPU sg length.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56594" }, { "cve": "CVE-2024-56595", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree. When the value of lp is 0 at the beginning of the for loop, it will become negative in the next assignment and we should bail out.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56595" }, { "cve": "CVE-2024-56596", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jfs: array-index-out-of-bounds in jfs_readdir. The stbl might contain some invalid values. Added a check to return error code in that case.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56596" }, { "cve": "CVE-2024-56597", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jfs: fix shift-out-of-bounds in dbSplit. When dmt_budmin is less than zero, it causes errors in the later stages. Added a check to return an error beforehand in dbAllocCtl itself.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56597" }, { "cve": "CVE-2024-56598", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jfs: array-index-out-of-bounds fix in dtReadFirst. The value of stbl can be sometimes out of bounds due to a bad filesystem. Added a check with appopriate return of error code in that case.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56598" }, { "cve": "CVE-2024-56600", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56600" }, { "cve": "CVE-2024-56601", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create() sock_init_data() attaches the allocated sk object to the provided sock object. If inet_create() fails later, the sk object is freed, but the sock object retains the dangling pointer, which may create use-after-free later. Clear the sk pointer in the sock object on error.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56601" }, { "cve": "CVE-2024-56602", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "net: ieee802154: do not leave a dangling sk pointer in ieee802154_create(). sock_init_data() attaches the allocated sk object to the provided sock object. If ieee802154_create() fails later, the allocated sk object is freed, but the dangling pointer remains in the provided sock object, which may allow use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56602" }, { "cve": "CVE-2024-56603", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: af_can: do not leave a dangling sk pointer in can_create(). On error can_create() frees the allocated sk object, but sock_init_data() has already attached it to the provided sock object. This will leave a dangling sk pointer in the sock object and may cause use-after-free later.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56603" }, { "cve": "CVE-2024-56605", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() bt_sock_alloc() allocates the sk object and attaches it to the provided sock object. On error l2cap_sock_alloc() frees the sk object, but the dangling pointer is still attached to the sock object, which may create use-after-free in other code.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56605" }, { "cve": "CVE-2024-56606", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object. On error, packet_create() frees the sk object leaving the dangling pointer in the sock object on return. Some other code may try to use this pointer and cause use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56606" }, { "cve": "CVE-2024-56610", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "kcsan: Turn report_filterlist_lock into a raw_spinlock, with a KCSAN-enabled PREEMPT_RT kernel, we can see splats like sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56610" }, { "cve": "CVE-2024-56615", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bpf: OOB devmap writes when deleting elements against XSKMAP which also applies to DEVMAP - the index used for accessing map entry, due to being a signed integer, causes the OOB writes.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56615" }, { "cve": "CVE-2024-56619", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: When searching for records in a directory where the inode\u0027s i_size is corrupted and has a large value, memory access outside the folio/page range may occur, or a use-after-free bug may be detected if KASAN is enabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56619" }, { "cve": "CVE-2024-56623", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: qla2xxx: System crash is observed with stack trace warning of use after free.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56623" }, { "cve": "CVE-2024-56629", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "HID: wacom: Due to incorrect dev-\u003eproduct reporting by certain devices, null pointer dereferences occur when dev-\u003eproduct is empty, leading to potential system crashes.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56629" }, { "cve": "CVE-2024-56630", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: iput() is not called when new_inode() succeeded and dquot_initialize() failed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56630" }, { "cve": "CVE-2024-56633", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tcp_bpf: The current sk memory accounting logic in __SK_REDIRECT is pre-uncharging tosend bytes, which is either msg-\u003esg.size or a smaller value apply_bytes.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56633" }, { "cve": "CVE-2024-56634", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "gpio: grgpio: vulnerability due to a missing NULL check in grgpio_probe for the return value of devm_kasprintf(), leading to a kernel NULL pointer dereference error.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56634" }, { "cve": "CVE-2024-56636", "cwe": { "id": "CWE-241", "name": "Improper Handling of Unexpected Data Type" }, "notes": [ { "category": "summary", "text": "geneve: vulnerability in geneve_xmit_skb() arises from incorrectly assuming the MAC header is set in the output path, which can lead to errors. The fix involves using skb_eth_hdr() instead of eth_hdr() to ensure the MAC header is correctly referenced, preventing potential issues.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56636" }, { "cve": "CVE-2024-56637", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "netfilter: ipset: vulnerability involves a race condition where the ip_set.ko module can be unloaded by user space while it is requesting a set type backend module, potentially causing a kernel crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56637" }, { "cve": "CVE-2024-56642", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tipc: vulnerability in TIPC (Transparent Inter-Process Communication) involves a use-after-free issue with the UDP kernel socket in cleanup_bearer(), caused by premature reference count decrements, which is resolved by moving the decrement after releasing the socket.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56642" }, { "cve": "CVE-2024-56643", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "dccp: vulnerability in DCCP (Datagram Congestion Control Protocol) involves a memory leak in dccp_feat_change_recv where memory allocated for a new SP feature value is not freed if dccp_feat_push_confirm() fails, leading to potential resource exhaustion.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56643" }, { "cve": "CVE-2024-56644", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked in ip6_negative_advice() when this function is executed for an expired IPv6 route located in the exception table.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56644" }, { "cve": "CVE-2024-56645", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "can: j1939: vulnerability involves a reference count underflow issue in j1939_session_new(), which is fixed by adding an extra skb_get() to match the behavior of j1939_session_skb_queue().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56645" }, { "cve": "CVE-2024-56648", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: hsr: avoid potential out-of-bound access in fill_frame_info(). By extending the check to cover packets with only 14 bytes, it prevents uninitialized values from causing undefined behavior or security issues.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56648" }, { "cve": "CVE-2024-56650", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: fix LED ID check in led_tg_check() Syzbot has reported the following BUG detected by KASAN", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56650" }, { "cve": "CVE-2024-56659", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: lapb: It is unclear if net/lapb code is supposed to be ready for 8021q, this may lead to crashes.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56659" }, { "cve": "CVE-2024-56661", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tipc: NULL deref in cleanup_bearer().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56661" }, { "cve": "CVE-2024-56662", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56662" }, { "cve": "CVE-2024-56670", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: gadget: u_serial: gs_start_io crashed due to accessing null pointer. Considering that in some extreme cases, when u_serial driver is accessed by multiple threads, Thread A is executing the open operation and calling the gs_open, Thread B is executing the disconnect operation and calling the gserial_disconnect function, the port-\u003eport_usb pointer will be set to NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56670" }, { "cve": "CVE-2024-56681", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "crypto: bcm - add error check in the ahash_hmac_init function The ahash_init functions may return fails. The ahash_hmac_init should not return ok when ahash_init returns error.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56681" }, { "cve": "CVE-2024-56688", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport Since transport-\u003esock has been set to NULL during reset transport, XPRT_SOCK_UPD_TIMEOUT also needs to be cleared.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56688" }, { "cve": "CVE-2024-56690", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56690" }, { "cve": "CVE-2024-56691", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device While design wise the idea of converting the driver to use the hierarchy of the IRQ chips is correct, the implementation has (inherited) flaws.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56691" }, { "cve": "CVE-2024-56698", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: dwc3: gadget: looping of queued SG entries The dwc3_request-\u003enum_queued_sgs is decremented on completion. If a partially completed request is handled, then the dwc3_request-\u003enum_queued_sgs no longer reflects the total number of num_queued_sgs (it would be cleared).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56698" }, { "cve": "CVE-2024-56700", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: wl128x: Atomicity violation occurs when the fmc_send_cmd() function is executed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56700" }, { "cve": "CVE-2024-56701", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "powerpc/pseries: The dtl_access_lock needs to be a rw_sempahore, a sleeping lock, because the code calls kmalloc() while holding it, which can sleep.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56701" }, { "cve": "CVE-2024-56704", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "9p/xen: A fix release of IRQ Kernel logs indicate an IRQ was double-freed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56704" }, { "cve": "CVE-2024-56705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: atomisp: In ia_css_3a_statistics_allocate(), there is no check on the allocation result of the rgby_data memory. If rgby_data is not successfully allocated, it may trigger the assert(host_stats-\u003ergby_data) assertion in ia_css_s3a_hmem_decode().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56705" }, { "cve": "CVE-2024-56720", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bpf, sockmap: Several fixes to bpf_msg_pop_data, 1. In sk_msg_shift_left, it should put_page 2. if (len == 0), returning early is better 3. pop the entire sk_msg (last == msg-\u003esg.size) should be supported 4. Fix for the value of variable \"a\" 5. In sk_msg_shift_left, after shifting, it has already pointed to the next element. Addtional sk_msg_iter_var_next may result in BUG.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56720" }, { "cve": "CVE-2024-56723", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices. While design wise the idea of converting the driver to use the hierarchy of the IRQ chips is correct, the implementation has (inherited) vulnerabilities. This was unveiled when platform_get_irq() had started WARN() on IRQ 0 that is supposed to be a Linux IRQ number (also known as vIRQ).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56723" }, { "cve": "CVE-2024-56724", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device. While design wise the idea of converting the driver to use the hierarchy of the IRQ chips is correct, the implementation has (inherited) vulnerability. This was unveiled when platform_get_irq() had started WARN() on IRQ 0 that is supposed to be a Linux IRQ number (also known as vIRQ).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56724" }, { "cve": "CVE-2024-56728", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c. Add error pointer check after calling otx2_mbox_get_rsp().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56728" }, { "cve": "CVE-2024-56739", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "rtc: check if __rtc_read_time was successful in rtc_timer_do_work() If the __rtc_read_time call fails, the struct rtc_time tm; may contain uninitialized data, or an illegal date/time read from the RTC hardware. When calling rtc_tm_to_ktime later, the result may be a very large value (possibly KTIME_MAX). If there are periodic timers in rtc-\u003etimerqueue, they will continually expire, may causing kernel softlockup.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56739" }, { "cve": "CVE-2024-56741", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "apparmor: test: Fix memory leak for aa_unpack_strdup() The string allocated by kmemdup() in aa_unpack_strdup() is not freed and cause following memory leaks.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56741" }, { "cve": "CVE-2024-56746", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "fbdev: sh7760fb: vulnerability involves a potential memory leak in sh7760fb_alloc_mem() where sh7760fb_free_mem() does not release memory correctly if info-\u003escreen_base is not ready, which is fixed by calling dma_free_coherent() instead.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56746" }, { "cve": "CVE-2024-56747", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: qedi: vulnerability involves a potential memory leak in qedi_alloc_and_init_sb() where the DMA memory sb_virt is not released upon failure, which is fixed by adding dma_free_coherent() to free the memory, similar to other functions like qedr_alloc_mem_sb() and qede_alloc_mem_sb().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56747" }, { "cve": "CVE-2024-56748", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: qedf: vulnerability involves a potential memory leak in qedf_alloc_and_init_sb() where the DMA memory sb_virt is not released upon failure, which is fixed by adding dma_free_coherent() to free the memory, similar to other functions like qedr_alloc_mem_sb() and qede_alloc_mem_sb().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56748" }, { "cve": "CVE-2024-56754", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "crypto: vulnerability due to passing an incorrect parameter type to devm_add_action_or_reset() in the CAAM driver, which is fixed by ensuring the correct parameter type is used to properly release resources.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56754" }, { "cve": "CVE-2024-56756", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nvme-pci: vulnerability involves an incorrect size being passed to dma_free_coherent in nvme-pci due to __nvme_alloc_host_mem potentially using fewer descriptors than planned, which is fixed by ensuring the correct size is used for freeing the HMB descriptor table.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56756" }, { "cve": "CVE-2024-56770", "cwe": { "id": "CWE-670", "name": "Always-Incorrect Control Flow Implementation" }, "notes": [ { "category": "summary", "text": "net/sched: netem: The interface fully stops transferring packets and \"locks\". In this case, the child qdisc and tfifo are empty, but \u0027qlen\u0027 indicates the tfifo is at its limit and no more packets are accepted.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56770" }, { "cve": "CVE-2024-56779", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur\r\n\r\nThe action force umount(umount -f) will attempt to kill all rpc_task even\r\numount operation may ultimately fail if some files remain open.\r\nConsequently, if an action attempts to open a file, it can potentially\r\nsend two rpc_task to nfs server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56779" }, { "cve": "CVE-2024-56780", "cwe": { "id": "CWE-833", "name": "Deadlock" }, "notes": [ { "category": "summary", "text": "quota: flush quota_release_work upon quota writeback One of the paths quota writeback is called from is: freeze_super() sync_filesystem() ext4_sync_fs() dquot_writeback_dquots().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56780" }, { "cve": "CVE-2024-56781", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "powerpc/prom_init: missing powermac #size-cells.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56781" }, { "cve": "CVE-2024-56785", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "notes": [ { "category": "summary", "text": "MIPS: Loongson64: DTS: issues with PCIe port nodes for ls7a.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-56785" }, { "cve": "CVE-2024-57874", "cwe": { "id": "CWE-824", "name": "Access of Uninitialized Pointer" }, "notes": [ { "category": "summary", "text": "arm64: ptrace: vulnerability due to an uninitialized variable in the tagged_addr_ctrl_set() function, leading to potential memory leakage from the kernel stack when a zero-length SETREGSET call is made, exposing up to 64 bits of memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "title": "CVE-2024-57874" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…